{"title":"Network Intrusion Detection via a Hybrid of Genetic Algorithms and Principal Component Analysis","authors":"N. Nalini, R. Raghavendra","doi":"10.1109/ADCOM.2006.4289877","DOIUrl":null,"url":null,"abstract":"In recent years network intrusion has been a problem of great concern to the design of secure computing systems. To detect an intrusion and the type of intrusion, it is desired to characterize an intrusion by its features so that future intrusions can be classified based on these features. In this paper, we present a novel method driven by the genetic algorithms and principal component analysis. This hybrid approach detects intrusions with an accuracy better than the best available till date, for several simulated tests conducted. It is hoped that this technique can also be used to detect the class of intrusion.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 International Conference on Advanced Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ADCOM.2006.4289877","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
In recent years network intrusion has been a problem of great concern to the design of secure computing systems. To detect an intrusion and the type of intrusion, it is desired to characterize an intrusion by its features so that future intrusions can be classified based on these features. In this paper, we present a novel method driven by the genetic algorithms and principal component analysis. This hybrid approach detects intrusions with an accuracy better than the best available till date, for several simulated tests conducted. It is hoped that this technique can also be used to detect the class of intrusion.