Security Investigate

Using Enumeration in a GA Based Intrusion Detection

Download now Free registration required

Executive Summary

In the last few years there has been a tremendous increase in connectivity between systems which has brought about limitless possibilities and opportunities. Unfortunately security related problems have also increased at the same rate. Computer systems are becoming increasingly vulnerable to attacks. These attacks or intrusions based on flaws in operating system or application programs usually read or modify confidential information or render the system useless. Different soft computing techniques are used for Network Intrusion Detection (NID).This paper presents an effective GA based approach to generate the classification rules for network intrusion detection. While applying GA an, enumeration technique is used to select the gene values in a chromosome.

  • Format: PDF
  • Size: 398.72 KB