Anomaly Intrusion Detection Using Multi-Objective Genetic Fuzzy System and Agent-Based Evolutionary Computation Framework

Author(s):  
Chi-Ho Tsang ◽  
Sam Kwong ◽  
Hanli Wang
2011 ◽  
Vol 20 (4-5) ◽  
pp. 185-193 ◽  
Author(s):  
J. Arokia Renjit ◽  
K. L. Shunmuganathan

2018 ◽  
Vol 6 (2) ◽  
pp. 7-12
Author(s):  
P. Sreenivsulu ◽  
◽  
Dr. K. Ramesh Reddy ◽  

In recent years with increasing number of wireless devices Ad Hoc Networks become a vital technology. But these networks are highly vulnerable to attacks due to several reasons such as changing topology, open medium and lack of centralized monitoring. Current intrusion detection systems are based on either rule based or behavior model. The efficiency of such IDS is based on how accurate they identify the attacks. In clustering a cluster head is selected as coordinator for performing transmissions in both inter and intra cluster environment. There are many models for choosing a cluster head in Ad Hoc environment. However if the cluster head itself is a compromised node then the cluster head can launch attacks without being detected since its IDS is already malfunctioned. In this paper we propose an “Enhanced Cooperative Tamper Evident Agent Based Anomaly Intrusion Detection System”, which helps in identifying the attacks more accurately even if cluster head is compromised.


2017 ◽  
Vol 23 (4) ◽  
pp. 1321-1336 ◽  
Author(s):  
Salma Elhag ◽  
Alberto Fernández ◽  
Abdulrahman Altalhi ◽  
Saleh Alshomrani ◽  
Francisco Herrera

Author(s):  
Yiguang Gong ◽  
Yunping Liu ◽  
Chuanyang Yin

AbstractEdge computing extends traditional cloud services to the edge of the network, closer to users, and is suitable for network services with low latency requirements. With the rise of edge computing, its security issues have also received increasing attention. In this paper, a novel two-phase cycle algorithm is proposed for effective cyber intrusion detection in edge computing based on a multi-objective genetic algorithm (MOGA) and modified back-propagation neural network (MBPNN), namely TPC-MOGA-MBPNN. In the first phase, the MOGA is employed to build a multi-objective optimization model that tries to find the Pareto optimal parameter set for MBPNN. The Pareto optimal parameter set is applied for simultaneous minimization of the average false positive rate (Avg FPR), mean squared error (MSE) and negative average true positive rate (Avg TPR) in the dataset. In the second phase, some MBPNNs are created based on the parameter set obtained by MOGA and are trained to search for a more optimal parameter set locally. The parameter set obtained in the second phase is used as the input of the first phase, and the training process is repeated until the termination criteria are reached. A benchmark dataset, KDD cup 1999, is used to demonstrate and validate the performance of the proposed approach for intrusion detection. The proposed approach can discover a pool of MBPNN-based solutions. Combining these MBPNN solutions can significantly improve detection performance, and a GA is used to find the optimal MBPNN combination. The results show that the proposed approach achieves an accuracy of 98.81% and a detection rate of 98.23% and outperform most systems of previous works found in the literature. In addition, the proposed approach is a generalized classification approach that is applicable to the problem of any field having multiple conflicting objectives.


Sign in / Sign up

Export Citation Format

Share Document