КОНЦЕПЦИЯ НА ГЕНЕТИЧНИЯ АЛГОРИТЪМ ЗА ОТКРИВАНЕ НА ПРОНИКВАНИЯ В КОМПЮТЪРНАТА МРЕЖА
Ключови думи :
Генетичен алгоритъм, откриване на проникване в мрежата, хромозомна структура, правило за откриване на проникване.Абстракт
Резюме: Настоящата работа разглежда основната функционалност и структура на генетичните алгоритми. Последователността на характеристиките на мрежовите връзки се интерпретира като хромозома, която дефинира правило за откриване на проникване, докато самите характеристики се считат за гени на хромозома. Представени са основните характеристики на IP v-4 и IP-v6 мрежата и тяхната структура. Илюстрирани са с примери за мрежови връзки на проникване и нормални мрежови връзки.Сваляния
Данните за свалянията все още не са налични.
Литература (библиография)
[1.] M. SazzadulHoque, Md. A. Mukit, Md. A. N. Bikas. An implementation of intrusion detection system using genetic algorithm, International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012, pp. 109-119.
[2.] R. H. Gong, M. Zulkernine, P. Abolmaesumi, ”A software implementation of a genetic algorithm based approach to network intrusion detection”, in Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks, SNPD/SAWN’05), 0-7695-2294-7/05, 2005.
[3.] Omprakash Chandrakar, Rekha Singh, Lal Bihari Barik. Application of Genetic Algorithm in Intrusion Detection System, Control Theory and Informatics, Vol.4, No.1, 2014, pp. 50-57.
[4.] Vr.Yewale, V.Jethani, T.Ghorpade. Applying Genetic Algorithm to Intrusion Detection System, International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 524-529.
[5.] Ehab Talal Abde-Ra'of Bader, Hebah H. O. Nasereddin. Using genetic algorithm in network security, IJRRAS vol. 5 (2), Nov. 2010, pp. 148-154.
[6.] B. Uppalaiah, K. Anand, B. Narsimha, S. Swaraj, T. Bharat. Genetic Algorithm Approach to Intrusion Detection System, International Journal of Computer science e and techhnology IJCST Vol. 3, Issue 1, Jan. - March 2012, pp. 156-160.
[7.] F.Alabsi, R.Naoum, Fitness Function for Genetic Algorithm used in Intrusion Detection System, International Journal of Applied Science and Technology, Vol. 2 No. 4; April 2012, pp. 129-134.
[8.] S. Chowdhury, S. Kumar Das, Ann. Das. Application of genetic algorithm in communication network security, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 1, January 2015, pp. 274-280.
[9.] Ch. Sinclair, L. Pierce. An application of machine learning to network intrusion detection, published in: Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), 6-10 Dec. 1999. DOI: 10.1109/CSAC.1999.816048.
[10.] P. A. Diaz-Gomez, D. F. Hougen. Improved off-line intrusion detection using genetic algorithm, in Proceedings of the Seventh International Conference on Enterprise Information Systems, 2005. http://www.cameron.edu/~pdiaz-go/Art_ICEIS.pdf
[11.] R. Shanmugavadivu, Dr.N.Nagarajan. Network intrusion detection system using Fuzzy logic. Indian Journal of Computer Science and Engineering (IJCSE), vol. 2, No1, 2011, pp. 101-111.
[12.] R. Messenger R. Dove. Basic genetic algorithm pattern for use in self-organizing agile security, IEEE International Carnahan Conference on Security Technology (ICCST), Boston, MA, USA, 15-18 Oct. 2012, 2 Aug. 2012.
[13.] S. Mukkamala, A. Sung, A. Abrham. (2004), Modeling Intrusion Detection System using Linear Genetic Programming Approach, Proceeding IEA/AIE 17th International Conference on Innovations in Applied Artificial Intelligence, pp. 633-642, ISBN: 3-540-22007-0.
https://www.researchgate.net/publication/221049814_Modeling_Intrusion_Detection_Systems_Using_Linear_Genetic_Programming_Approach
http://www.rmltech.com/doclink/LGP%20Based%20IDS.pdf.
[14.] V. Bapuji, R. N. Kumar, A. Goverdan, and S. Sharma, “Soft Computing and Artificial Intelligence Techniques for Intrusion Detection System,” Networks and Complex Systems, vol. 2, no. 4, 2012.
[15.] An.Goya, Ch. Kumar. GA-NIDS: A Genetic Algorithm based Network Intrusion Detection System, 2007.
https://pdfs.semanticscholar.org/6c8e/6708a1a737a9a5509de2fba46f8de1aff7e3.pdf
[16.] Wei Li, Using Genetic Algorithm for Network Intrusion Detection,
https://pdfs.semanticscholar.org/9175/54c7cce69e6ee9708020863f2bd27fa986a6.pdf
[17.] Sh. Devi, R. Nagpal. Intrusion Detection SystemUsingGeneticAlgorithm-A Review, International Journal of Computing & Business Research, Proceedings of ‘I-Society 2012’atGKU,Talwandi Sabo Bathinda (Punjab). ISSN (Online): 2229-6166
[2.] R. H. Gong, M. Zulkernine, P. Abolmaesumi, ”A software implementation of a genetic algorithm based approach to network intrusion detection”, in Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks, SNPD/SAWN’05), 0-7695-2294-7/05, 2005.
[3.] Omprakash Chandrakar, Rekha Singh, Lal Bihari Barik. Application of Genetic Algorithm in Intrusion Detection System, Control Theory and Informatics, Vol.4, No.1, 2014, pp. 50-57.
[4.] Vr.Yewale, V.Jethani, T.Ghorpade. Applying Genetic Algorithm to Intrusion Detection System, International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 524-529.
[5.] Ehab Talal Abde-Ra'of Bader, Hebah H. O. Nasereddin. Using genetic algorithm in network security, IJRRAS vol. 5 (2), Nov. 2010, pp. 148-154.
[6.] B. Uppalaiah, K. Anand, B. Narsimha, S. Swaraj, T. Bharat. Genetic Algorithm Approach to Intrusion Detection System, International Journal of Computer science e and techhnology IJCST Vol. 3, Issue 1, Jan. - March 2012, pp. 156-160.
[7.] F.Alabsi, R.Naoum, Fitness Function for Genetic Algorithm used in Intrusion Detection System, International Journal of Applied Science and Technology, Vol. 2 No. 4; April 2012, pp. 129-134.
[8.] S. Chowdhury, S. Kumar Das, Ann. Das. Application of genetic algorithm in communication network security, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 1, January 2015, pp. 274-280.
[9.] Ch. Sinclair, L. Pierce. An application of machine learning to network intrusion detection, published in: Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), 6-10 Dec. 1999. DOI: 10.1109/CSAC.1999.816048.
[10.] P. A. Diaz-Gomez, D. F. Hougen. Improved off-line intrusion detection using genetic algorithm, in Proceedings of the Seventh International Conference on Enterprise Information Systems, 2005. http://www.cameron.edu/~pdiaz-go/Art_ICEIS.pdf
[11.] R. Shanmugavadivu, Dr.N.Nagarajan. Network intrusion detection system using Fuzzy logic. Indian Journal of Computer Science and Engineering (IJCSE), vol. 2, No1, 2011, pp. 101-111.
[12.] R. Messenger R. Dove. Basic genetic algorithm pattern for use in self-organizing agile security, IEEE International Carnahan Conference on Security Technology (ICCST), Boston, MA, USA, 15-18 Oct. 2012, 2 Aug. 2012.
[13.] S. Mukkamala, A. Sung, A. Abrham. (2004), Modeling Intrusion Detection System using Linear Genetic Programming Approach, Proceeding IEA/AIE 17th International Conference on Innovations in Applied Artificial Intelligence, pp. 633-642, ISBN: 3-540-22007-0.
https://www.researchgate.net/publication/221049814_Modeling_Intrusion_Detection_Systems_Using_Linear_Genetic_Programming_Approach
http://www.rmltech.com/doclink/LGP%20Based%20IDS.pdf.
[14.] V. Bapuji, R. N. Kumar, A. Goverdan, and S. Sharma, “Soft Computing and Artificial Intelligence Techniques for Intrusion Detection System,” Networks and Complex Systems, vol. 2, no. 4, 2012.
[15.] An.Goya, Ch. Kumar. GA-NIDS: A Genetic Algorithm based Network Intrusion Detection System, 2007.
https://pdfs.semanticscholar.org/6c8e/6708a1a737a9a5509de2fba46f8de1aff7e3.pdf
[16.] Wei Li, Using Genetic Algorithm for Network Intrusion Detection,
https://pdfs.semanticscholar.org/9175/54c7cce69e6ee9708020863f2bd27fa986a6.pdf
[17.] Sh. Devi, R. Nagpal. Intrusion Detection SystemUsingGeneticAlgorithm-A Review, International Journal of Computing & Business Research, Proceedings of ‘I-Society 2012’atGKU,Talwandi Sabo Bathinda (Punjab). ISSN (Online): 2229-6166
Файлове за сваляне
Публикуван
2019-06-10
Брой
Раздел (Секция)
Компютърни науки и комуникации - рецензирани публикации. ISSN: 1314-7846
Лиценз
Статиите публикувани в списание КНК са лицензирани под Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Как да цитирате
КОНЦЕПЦИЯ НА ГЕНЕТИЧНИЯ АЛГОРИТЪМ ЗА ОТКРИВАНЕ НА ПРОНИКВАНИЯ В КОМПЮТЪРНАТА МРЕЖА. (2019). КОМПЮТЪРНИ НАУКИ И КОМУНИКАЦИИ, 8(1), 3-12. https://csc.bfu.bg/index.php/CSC/article/view/231