Volume 32 Issue 6
Jan.  2018
Article Contents

Huang Yu, Huang Diming, He Xianfeng, Wu Ming. Research of Genetic Algorithm Applied to IDS[J]. Journal of University of Electronic Science and Technology of China, 2003, 32(6): 679-682.
Citation: Huang Yu, Huang Diming, He Xianfeng, Wu Ming. Research of Genetic Algorithm Applied to IDS[J]. Journal of University of Electronic Science and Technology of China, 2003, 32(6): 679-682.

Research of Genetic Algorithm Applied to IDS

  • Received Date: 2003-04-15
  • Publish Date: 2003-12-15
  • This paper introduces the model discursion-based intrusion detection system and the model-based intrusion detection system and presents a new kind of IDS based on agent, by which IDS distributes data and task to the nodes in the networks. Thus IDS can make best use of compute capability and resources of the networks, which covers the shortage of conventional centralized intrusion detection approach. Importantly, the genetic algorithm applied to the IDS is introduced in detail. In allusion to the apriori knowledge of system security always embodying as the selection of the useful subset of attributes in original data, this IDS uses the genetic algorithms to optimize the feature subset selection and to find the relative optimal subset of attributes expressed by feature vector. The IDS uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified.
  • 加载中
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Article Metrics

Article views(3606) PDF downloads(75) Cited by()

Related
Proportional views

Research of Genetic Algorithm Applied to IDS

Abstract: This paper introduces the model discursion-based intrusion detection system and the model-based intrusion detection system and presents a new kind of IDS based on agent, by which IDS distributes data and task to the nodes in the networks. Thus IDS can make best use of compute capability and resources of the networks, which covers the shortage of conventional centralized intrusion detection approach. Importantly, the genetic algorithm applied to the IDS is introduced in detail. In allusion to the apriori knowledge of system security always embodying as the selection of the useful subset of attributes in original data, this IDS uses the genetic algorithms to optimize the feature subset selection and to find the relative optimal subset of attributes expressed by feature vector. The IDS uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified.

Huang Yu, Huang Diming, He Xianfeng, Wu Ming. Research of Genetic Algorithm Applied to IDS[J]. Journal of University of Electronic Science and Technology of China, 2003, 32(6): 679-682.
Citation: Huang Yu, Huang Diming, He Xianfeng, Wu Ming. Research of Genetic Algorithm Applied to IDS[J]. Journal of University of Electronic Science and Technology of China, 2003, 32(6): 679-682.

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return