Detection Of Cyber Attack Using Artificial Intelligence Based Genetic Algorithm With Feedback Ingestion
Jay Parag Mehta1 , Digvijaysinh M. Rathod2
Section:Review Paper, Product Type: Journal Paper
Volume-7 ,
Issue-5 , Page no. 672-678, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.672678
Online published on May 31, 2019
Copyright © Jay Parag Mehta, Digvijaysinh M. Rathod . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Jay Parag Mehta, Digvijaysinh M. Rathod, “Detection Of Cyber Attack Using Artificial Intelligence Based Genetic Algorithm With Feedback Ingestion,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.672-678, 2019.
MLA Style Citation: Jay Parag Mehta, Digvijaysinh M. Rathod "Detection Of Cyber Attack Using Artificial Intelligence Based Genetic Algorithm With Feedback Ingestion." International Journal of Computer Sciences and Engineering 7.5 (2019): 672-678.
APA Style Citation: Jay Parag Mehta, Digvijaysinh M. Rathod, (2019). Detection Of Cyber Attack Using Artificial Intelligence Based Genetic Algorithm With Feedback Ingestion. International Journal of Computer Sciences and Engineering, 7(5), 672-678.
BibTex Style Citation:
@article{Mehta_2019,
author = {Jay Parag Mehta, Digvijaysinh M. Rathod},
title = {Detection Of Cyber Attack Using Artificial Intelligence Based Genetic Algorithm With Feedback Ingestion},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {672-678},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4298},
doi = {https://doi.org/10.26438/ijcse/v7i5.672678}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.672678}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4298
TI - Detection Of Cyber Attack Using Artificial Intelligence Based Genetic Algorithm With Feedback Ingestion
T2 - International Journal of Computer Sciences and Engineering
AU - Jay Parag Mehta, Digvijaysinh M. Rathod
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 672-678
IS - 5
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
369 | 241 downloads | 124 downloads |
Abstract
Strong intrusion detection is considered as a basic requirement for detecting any cyber attack before the breach yield successful outcomes for intruders along with automated prevention or response to such attacks being the next level of requirement. Although various tools and techniques are available for detecting such activities, intruders are still able to intrude heterogeneous environments successfully across the globe. This research work essentially takes the case of various models suggested in this direction, how they get deployed and what appears insufficient in their functioning making it difficult to be implemented. This research work focuses on developing improved models or improving existing models for designing and deployment of network security frameworks and policies, in which functioning of each component and their interconnectivity is taken towards more sufficiency to yield better actions thereby ensuring best possible level of security for all the system present within environment. The fitness functions for the system and which parameters could be used to decide genes for various network events is discussed along with a method to calculate the overall fitness of various network events.
Key-Words / Index Term
Attack vector, Artificial Intelligence, Crossover, Cyber attack, Cyber Security, Feedback ingestion, Fitness function threshold, Gene, Genetic Algorithm, Intrusion Detection System, Machine Learning, Model, Mutation, Network Event, Network Packet, Network Security, Network Security Policy Framework, Selection, Self-evolutionary
References
[1] Leslie Pack Kaelbling, Michael L. Littman, Andrew W. Moore, "Reinforcement Learning: A Survey", Journal of Artificial Intelligence Research, pp.237-285, 1996.
[2] SU Pu-Rui, LI De-Quan, FENG Deng-Guo, "A Host-Based Anomaly Intrusion Detection Model Based on Genetic Programming", Journal of Software, pp.1120-1126, June 2003.
[3] Pohlheim, Hartmut, "Genetic and Evolutionary Algorithms: Principles, Methods and Algorithms", Genetic and Evolutionary Algorithm Toolbox, 30 October 2003.
[4] Mukkamala R., Chekuri L., Moharrum M., Palley S., "Policy-Based Security Management for Enterprise Systems", International Federation for Information Processing: Research Directions in Data and Applications Security XVIII, Springer, Boston, MA, Vol.144, pp.219-233, 2004.
[5] Wei Li, "Using Genetic Algorithm for Network Intrusion Detection", Proceedings of the United States Department of Energy Cyber Security Group 2004 Training Conference, Kansas City, Kansas, USA, pp.1-8, 24-27 May 2004.
[6] Jeffrey O. Kephart, William E. Walsh, "An Artificial Intelligence Perspective on Autonomic Computing Policies", Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, Yorktown Heights, NY, USA, pp.3-12, 9 June 2004.
[7] Arosha K. Bandara, Emil Constantin Lupu, J. Moffett, Alessandra Russo, "A Goal-based Approach to Policy Refinement", Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, Yorktown Heights, NY, USA, pp.229-239, 9 June 2004.
[8] Yao Jian, Sun Changping, Sun Hu, Mao Bing, Huang Hao, Xie Li, "Research on Policy-Based Security Management", Computer Applications and Software, March 2005 (in Chinese).
[9] Chuanhuan Yin, Shengfeng Tian, Houkuan Huang, Jun He, "Applying Genetic Programming to Evolve Learned Rules for Network Anomaly Detection", International Conference on Natural Computation: Advances in Natural Computation, Springer, Berlin, Heidelberg, Vol.3612, pp.323-331, 27-29 August 2005.
[10] Ryen W. White, Joemon M. Jose, Ian Ruthven, "An implicit feedback approach for interactive information retrieval", Information Processing & Management, Vol.42, Issue.1, pp.166-190, January 2006.
[11] Hoi Chan, Thomas Kwok, "A Policy Based management System with Automatic Policy Selection and Creation Capabilities by using Singular Value Decomposition Technique", Seventh IEEE International Workshop on Policies for Distributed Systems and Networks, London, Ont., Canada, pp.4-99, 5-7 June 2006.
[12] Anup Goyal, Chetan Kumar, "GA-NIDS: A Genetic Algorithm based Network Intrusion Detection System", 2007.
[13] A.B.M Alim Al Islam, Md. Ariful Azad, Md. Khurshid Alam, Md. Shamsul Alam, "Security Attack Detection using Genetic Algorithm (GA) in Policy Based Network", International Conference on Information and Communication Technology, Dhaka, Bangladesh, pp.341-347, 7-9 March 2007.
[14] CHEN Xiao-su, WU Jin-hua, NI jun, "Genetic-Feedback Algorithm Based Network Security Policy Framework", International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, China, pp.2278-2281, 21-25 September 2007.
[15] Atish Mishra, Prakash Kumar, "Storing Scheme for State Machine based Rule Base of Genetic Feedback Algorithm Based Network Security Policy Framework Depending on Memory Consumption", International Conference on Machine Learning and Computing, pp.349-353, 2009.
[16] Atish Mishra, Arun Kumar Jhapate, Prakash Kumar, "Designing Rule Base for Genetic Feedback Algorithm Based Network Security Policy Framework using State Machine", International Conference on Signal Processing Systems, Singapore, pp.415-417, 15-17 May 2009.
[17] Atish Mishra, Arun Kumar Jhapate, Prakash. Kumar, "Improved Genetic Feedback Algorithm Based Network Security Policy Frame Work", Second International Conference on Future Networks, Sanya, Hainan, China, pp.8-10, 22-24 January 2010.
[18] Suhas B. Chavan, L.M.R.J. Lobo, "Network Security policy framework and Analysis", IJCA Special Issue on Network Security and Cryptography, pp.55-58, 2011.
[19] Srinivasa K.G., "Application of Genetic Algorithms for Detecting Anomaly in Network Intrusion Detection Systems", International Conference on Computer Science and Information Technology: Advances in Computer Science and Information Technology. Networks and Communications, Springer, Berlin, Heidelberg, Vol.84, pp.582-591, 2012.
[20] B. Uppalaiah, K. Anand, B. Narsimha, S. Swaraj, T. Bharat, "Genetic Algorithm Approach to Intrusion Detection System", IJCST, Vol.3, Issue.1, pp.156-160, March 2012.
[21] Louis Mervin Rainey Joseph Lobo, Suhas B. Chavan, "Use of Genetic Algorithm in Network Security", International Journal of Computer Applications, Vol.53, Issue.8, pp.1-7, September 2012.
[22] Khalid Jebari, Mohammed Madiafi, "Selection Methods for Genetic Algorithms", International Journal of Emerging Sciences, Vol.3, Issue.4, pp.333-344, December 2013.