Genetic algorithm for intrusion detection system in computer network

6Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

Internet connection nowadays has become one of the essential requirements to execute our daily activities effectively. Among the major applications of wide Internet connections is local area network (LAN) which connects all internet-enabled devices in a small-scale area such as office building, computer lab etc. This connection will allow legit user to access the resources of the network anywhere as long as authorization is acquired. However, this might be seen as opportunities for some people to illegally access the network. Hence, the occurrence of network hacking and privacy breach. Therefore, it is very vital for a computer network administrator to install a very protective and effective method to detect any network intrusion and, secondly to protect the network from illegal access that can compromise the security of the resources in the network. These resources include sensitive and confidential information that could jeopardise someone's life or sovereignty of a country if manipulated by wrong hands. In Network Intrusion Detection System (NIDS) framework, apart from detecting unauthorized access, it is equally important to recognize the type of intrusions in order for the necessary precautions and preventive measures to take place. This paper presents the application of Genetic Algorithm (GA) and its steps in performing intrusion detection process. Standard benchmark dataset known as KDD'99 cup was utilized with forty-one distinctive features representing the identity of network connections. Results presented demonstrate the effectiveness of the proposed method and warrant good research focus as it promises exciting discovery in solving similar patent of problems.

Cite

CITATION STYLE

APA

Suhaimi, H., Suliman, S. I., Harun, A. F., Mohamad, R., Yusof, Y. W. M., & Kassim, M. (2020). Genetic algorithm for intrusion detection system in computer network. Indonesian Journal of Electrical Engineering and Computer Science, 19(3), 1670–1676. https://doi.org/10.11591/ijeecs.v19.i3.pp1670-1676

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free