International Journal of Network Security & Its Applications (Ijnsa), Vol.4, No.2, March 2012

4792 Words Jan 14th, 2013 20 Pages
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
Mohammad Sazzadul Hoque1, Md. Abdul Mukit2 and Md. Abu Naser Bikas3
1

Student, Department of Computer Science and Engineering, Shahjalal University of Science and Technology, Sylhet, Bangladesh sazzad@ymail.com 2

Student, Department of Computer Science and Engineering, Shahjalal University of Science and Technology, Sylhet, Bangladesh mukit.sust027@gmail.com 3

Lecturer, Department of Computer Science and Engineering, Shahjalal University of Science and Technology, Sylhet, Bangladesh bikasbd@yahoo.com ABSTRACT
Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various
…show more content…
In general, most of these commercial implementations are relative ineffective and insufficient, which gives rise to the need for research on more dynamic intrusion detection systems. Generally an intruder is defined as a system, program or person who tries to and may become successful to break into an information system or perform an action not legally allowed [2]. We refer intrusion as any set of actions that attempt to compromise the integrity, confidentiality, or availability of a computer resource [3]. The act of detecting actions that attempt to compromise the integrity, confidentiality, or availability of a computer resource can be referred as intrusion detection [3]. An intrusion detection system is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports [4].
DOI : 10.5121/ijnsa.2012.4208 109

International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012

The remainder of the paper is organized as follows: Section 2 shortly describes some previous works. Section 3 gives an overview about intrusion detection system. Section 4 describes some existing intrusion detection systems and their problems. Section 5 and 6 describes our system and its implementation. Section 7 describes the performance analysis of our system. We conclude at

Related Documents