Intrusion Detection in Computer Netwrks Usin Genetic Algorithm Approach
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
sunilpawar
Active In SP
**

Posts: 1
Joined: Jun 2010
#1
28-06-2010, 10:37 AM


Dear Sir.
I am A MTech student .Im working on Intrusion Detection in computer networ using genetic algorithm approach.I am implementing the intrusion detection algorithm using genetic algorithm tool box of Matlab.
Kindly send me the matlab code for the same.
Thanks and Regards.

Sunil Pawar.
Reply
bindususa
Active In SP
**

Posts: 2
Joined: Jun 2010
#2
28-06-2010, 12:14 PM

can u send more details about intrusion detection system
Reply
seminars on demand
Active In SP
**

Posts: 201
Joined: Jun 2010
#3
28-06-2010, 05:21 PM

Using Genetic Algorithm for Network Intrusion Detection
Intrusion Detection System (IDS) has become one of the hottest research areas in Computer Security in the recent years. an intrusion occurs when somebody attempts to break into an information system or do an illegel activity. There can be external and internal intruders. The intrusion detection techniques is broadly classified into 2:
-misuse detection: These are the methods that characterize known methods to penetrate a system such as a patternâ„¢ or a Ëœsignature'.
- anomaly detection:
In this technique , the Behaviors that deviate from the expected normal behavior are considered intrusions.
Based on where where they look for intrusive behavior, there can be Network-based IDS (NIDS) and Host-based IDS.

Introduction to Genetic Algorithm
It consists of a family of computational models based on principles of evolution and natural selection. A randomly selected population of chromosomes are representations of the problem to be solved and different
positions of each chromosome are encoded as bits, characters, or numbers according to the problem being dealt with.The the goodness of each chromosome is done by a evaluation function.


Genetic Algorithm Applied to Intrusion Detection

simple rules for network traffic can be evolved from genetic algorithm. normal and anomalous network connections. the condition usually refers to a match between current network
connection and the rules in IDS. an action defined by the security policies within an organization is then taken by the IDS.

-Data Representation:
all fields related with a specific network
connection have to be examined for exploiting the suspicious level. Source, destination IP address, Port number of source and destination, duration, state, protocol etc are examined to be in the specified range of values.


for full information, refer this pdf:


.pdf   Using Genetic Algorithm for Network Intrusion Detection.pdf (Size: 385.71 KB / Downloads: 168)
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
elngar
Active In SP
**

Posts: 1
Joined: Mar 2011
#4
20-03-2011, 07:08 PM

i need matlab code to classify intrusion using genatic algorithm
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#5
27-01-2012, 10:45 AM


to get information about the topic economic load dispatch using genetic algorithm full report,ppt and related topic please refer the link bellow

topicideashow-to-application-of-genetic-algorithm-to-economic-load-dispatch-full-report

topicideashow-to-economic-load-dispatch

topicideashow-to-on-line-emission-and-economic-load-dispatch-using-adaptive-hopfield-neural-network
Reply
Guest
Thinking To Register

 
#6
21-07-2012, 03:36 PM

i want full details about Intrusion Detection in Computer Networks Using Genetic Algorithm Approach
i want full details about Intrusion Detection in Computer Networks Using Genetic Algorithm Approach
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  send me the algorithm on implementation of steganography based on lsb anannya 6 3,381 01-09-2014, 11:05 AM
Last Post: computer science crazy
  power theft detection Guest 1 507 09-09-2013, 09:43 AM
Last Post: study tips
  Brain Tumor Detection Using Matlab usman_sringeri 10 5,989 07-05-2013, 09:25 AM
Last Post: study tips
  digital image watermarking using Genetic algorithm Guest 0 572 24-04-2013, 12:03 PM
Last Post: Guest
  data base monitoring of power systems and fault detection using GPS Guest 0 557 15-04-2013, 06:19 PM
Last Post: Guest
  phase sequence detection with controlled voltage supply Guest 1 559 11-04-2013, 09:39 AM
Last Post: study tips
  obstacle detection and avoidance robot ankit.spmit 1 586 09-04-2013, 09:47 AM
Last Post: study tips
  Design of an Error Detection cvinoth2000 1 782 18-03-2013, 10:48 AM
Last Post: study tips
  computer virus Guest 1 550 15-03-2013, 10:02 AM
Last Post: study tips
  an algorithm for watermarking mobile phone colour images using bch code source code Guest 0 593 14-03-2013, 10:58 AM
Last Post: Guest