TAILIEUCHUNG - AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM

You will see a software installation policy record for the selected package in the right pane of the MMC console window. The client firewall setup will be installed the next time each client computer starts up regardless of which user logs onto it if the GPO is linked to the computer. Note: See the documentation on administering group policies for detailed information on deploying software applications using a group policy. Linking the GPO is performed from the Active Directory Users and Computers snap-in if the link is to domains or organizational units (OUs), or from the Active. | International Journal of Network Security Its Applications IJNSA March 2012 An Implementation of Intrusion Detection System using Genetic Algorithm Mohammad Sazzadul Hoque1 Md. Abdul Mukit2 and Md. Abu Naser Bikas3 1Student Department of Computer Science and Engineering Shahjalal University of Science and Technology Sylhet Bangladesh sazzad@ 2Student Department of Computer Science and Engineering Shahjalal University of Science and Technology Sylhet Bangladesh 3Lecturer Department of Computer Science and Engineering Shahjalal University of Science and Technology Sylhet Bangladesh bikasbd@ Abstract Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. So Intrusion Detection Systems have become a needful component in terms of computer and network security. There are various approaches being utilized in intrusion detections but unfortunately any of the systems so far is not completely flawless. So the quest of betterment continues. In this progression here we present an Intrusion Detection System IDS by applying genetic algorithm GA to efficiently detect various types of network intrusions. Parameters and evolution processes for GA are discussed in details and implemented. This approach uses evolution theory to information evolution in order to filter the traffic data and thus reduce the complexity. To implement and measure the performance of our system we used the KDD99 benchmark dataset and obtained reasonable detection rate. Keywords Computer Network Security Intrusion Detection Intrusion Detection System Genetic Algorithm KDD Cup 1999 Dataset. 1. Introduction In 1987 Dorothy E. Denning proposed intrusion detection as is an approach to counter the computer and networking attacks and misuses 1 . .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.