КОНЦЕПЦИЯ НА ГЕНЕТИЧНИЯ АЛГОРИТЪМ ЗА ОТКРИВАНЕ НА ПРОНИКВАНИЯ В КОМПЮТЪРНАТА МРЕЖА

Автори

  • Andon Lazarov
  • Петя Петрова

Ключови думи :

Генетичен алгоритъм, откриване на проникване в мрежата, хромозомна структура, правило за откриване на проникване.

Абстракт

Резюме: Настоящата работа разглежда основната функционалност и структура на генетичните алгоритми. Последователността на характеристиките на мрежовите връзки се интерпретира като хромозома, която дефинира правило за откриване на проникване, докато самите характеристики се считат за гени на хромозома. Представени са основните характеристики на IP v-4 и IP-v6 мрежата и тяхната структура. Илюстрирани са с примери за мрежови връзки на проникване и нормални мрежови връзки.

Сваляния

Данните за свалянията все още не са налични.

Литература (библиография)

[1.] M. SazzadulHoque, Md. A. Mukit, Md. A. N. Bikas. An implementation of intrusion detection system using genetic algorithm, International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012, pp. 109-119.
[2.] R. H. Gong, M. Zulkernine, P. Abolmaesumi, ”A software implementation of a genetic algorithm based approach to network intrusion detection”, in Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks, SNPD/SAWN’05), 0-7695-2294-7/05, 2005.
[3.] Omprakash Chandrakar, Rekha Singh, Lal Bihari Barik. Application of Genetic Algorithm in Intrusion Detection System, Control Theory and Informatics, Vol.4, No.1, 2014, pp. 50-57.
[4.] Vr.Yewale, V.Jethani, T.Ghorpade. Applying Genetic Algorithm to Intrusion Detection System, International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 524-529.
[5.] Ehab Talal Abde-Ra'of Bader, Hebah H. O. Nasereddin. Using genetic algorithm in network security, IJRRAS vol. 5 (2), Nov. 2010, pp. 148-154.
[6.] B. Uppalaiah, K. Anand, B. Narsimha, S. Swaraj, T. Bharat. Genetic Algorithm Approach to Intrusion Detection System, International Journal of Computer science e and techhnology IJCST Vol. 3, Issue 1, Jan. - March 2012, pp. 156-160.
[7.] F.Alabsi, R.Naoum, Fitness Function for Genetic Algorithm used in Intrusion Detection System, International Journal of Applied Science and Technology, Vol. 2 No. 4; April 2012, pp. 129-134.
[8.] S. Chowdhury, S. Kumar Das, Ann. Das. Application of genetic algorithm in communication network security, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 1, January 2015, pp. 274-280.
[9.] Ch. Sinclair, L. Pierce. An application of machine learning to network intrusion detection, published in: Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), 6-10 Dec. 1999. DOI: 10.1109/CSAC.1999.816048.
[10.] P. A. Diaz-Gomez, D. F. Hougen. Improved off-line intrusion detection using genetic algorithm, in Proceedings of the Seventh International Conference on Enterprise Information Systems, 2005. http://www.cameron.edu/~pdiaz-go/Art_ICEIS.pdf
[11.] R. Shanmugavadivu, Dr.N.Nagarajan. Network intrusion detection system using Fuzzy logic. Indian Journal of Computer Science and Engineering (IJCSE), vol. 2, No1, 2011, pp. 101-111.
[12.] R. Messenger R. Dove. Basic genetic algorithm pattern for use in self-organizing agile security, IEEE International Carnahan Conference on Security Technology (ICCST), Boston, MA, USA, 15-18 Oct. 2012, 2 Aug. 2012.
[13.] S. Mukkamala, A. Sung, A. Abrham. (2004), Modeling Intrusion Detection System using Linear Genetic Programming Approach, Proceeding IEA/AIE 17th International Conference on Innovations in Applied Artificial Intelligence, pp. 633-642, ISBN: 3-540-22007-0.
https://www.researchgate.net/publication/221049814_Modeling_Intrusion_Detection_Systems_Using_Linear_Genetic_Programming_Approach

http://www.rmltech.com/doclink/LGP%20Based%20IDS.pdf.
[14.] V. Bapuji, R. N. Kumar, A. Goverdan, and S. Sharma, “Soft Computing and Artificial Intelligence Techniques for Intrusion Detection System,” Networks and Complex Systems, vol. 2, no. 4, 2012.
[15.] An.Goya, Ch. Kumar. GA-NIDS: A Genetic Algorithm based Network Intrusion Detection System, 2007.
https://pdfs.semanticscholar.org/6c8e/6708a1a737a9a5509de2fba46f8de1aff7e3.pdf
[16.] Wei Li, Using Genetic Algorithm for Network Intrusion Detection,
https://pdfs.semanticscholar.org/9175/54c7cce69e6ee9708020863f2bd27fa986a6.pdf
[17.] Sh. Devi, R. Nagpal. Intrusion Detection SystemUsingGeneticAlgorithm-A Review, International Journal of Computing & Business Research, Proceedings of ‘I-Society 2012’atGKU,Talwandi Sabo Bathinda (Punjab). ISSN (Online): 2229-6166

Публикуван

2019-06-10

Брой

Раздел (Секция)

Компютърни науки и комуникации - рецензирани публикации. ISSN: 1314-7846

Как да цитирате

КОНЦЕПЦИЯ НА ГЕНЕТИЧНИЯ АЛГОРИТЪМ ЗА ОТКРИВАНЕ НА ПРОНИКВАНИЯ В КОМПЮТЪРНАТА МРЕЖА. (2019). КОМПЮТЪРНИ НАУКИ И КОМУНИКАЦИИ, 8(1), 3-12. https://csc.bfu.bg/index.php/CSC/article/view/231