Intrusion Detection in Computer Netwrks Usin Genetic Algorithm Approach
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 1
Joined: Jun 2010
28-06-2010, 10:37 AM

Dear Sir.
I am A MTech student .Im working on Intrusion Detection in computer networ using genetic algorithm approach.I am implementing the intrusion detection algorithm using genetic algorithm tool box of Matlab.
Kindly send me the matlab code for the same.
Thanks and Regards.

Sunil Pawar.
Active In SP

Posts: 2
Joined: Jun 2010
28-06-2010, 12:14 PM

can u send more details about intrusion detection system
seminars on demand
Active In SP

Posts: 201
Joined: Jun 2010
28-06-2010, 05:21 PM

Using Genetic Algorithm for Network Intrusion Detection
Intrusion Detection System (IDS) has become one of the hottest research areas in Computer Security in the recent years. an intrusion occurs when somebody attempts to break into an information system or do an illegel activity. There can be external and internal intruders. The intrusion detection techniques is broadly classified into 2:
-misuse detection: These are the methods that characterize known methods to penetrate a system such as a patternâ„¢ or a Ëœsignature'.
- anomaly detection:
In this technique , the Behaviors that deviate from the expected normal behavior are considered intrusions.
Based on where where they look for intrusive behavior, there can be Network-based IDS (NIDS) and Host-based IDS.

Introduction to Genetic Algorithm
It consists of a family of computational models based on principles of evolution and natural selection. A randomly selected population of chromosomes are representations of the problem to be solved and different
positions of each chromosome are encoded as bits, characters, or numbers according to the problem being dealt with.The the goodness of each chromosome is done by a evaluation function.

Genetic Algorithm Applied to Intrusion Detection

simple rules for network traffic can be evolved from genetic algorithm. normal and anomalous network connections. the condition usually refers to a match between current network
connection and the rules in IDS. an action defined by the security policies within an organization is then taken by the IDS.

-Data Representation:
all fields related with a specific network
connection have to be examined for exploiting the suspicious level. Source, destination IP address, Port number of source and destination, duration, state, protocol etc are examined to be in the specified range of values.

for full information, refer this pdf:

.pdf   Using Genetic Algorithm for Network Intrusion Detection.pdf (Size: 385.71 KB / Downloads: 167)
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Active In SP

Posts: 1
Joined: Mar 2011
20-03-2011, 07:08 PM

i need matlab code to classify intrusion using genatic algorithm
seminar addict
Super Moderator

Posts: 6,592
Joined: Jul 2011
27-01-2012, 10:45 AM

to get information about the topic economic load dispatch using genetic algorithm full report,ppt and related topic please refer the link bellow
Thinking To Register

21-07-2012, 03:36 PM

i want full details about Intrusion Detection in Computer Networks Using Genetic Algorithm Approach
i want full details about Intrusion Detection in Computer Networks Using Genetic Algorithm Approach

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: network intrusion detection system using genetic algorithm pdf, coding for ids using genetic algorithm, matlab code for network intrusion detection, intrusion detection system matlab code, project on intrusion detection on matlab, intrusion detection in computer networks, coding for intrusion detection system using genetic algorithm,
Popular Searches: energy gap of semiconductor usin four probe method, intrusion detection system algorithm, automatic attendance usin rfid full report pdf, seminar report on vechile monitoring and control usin psoc micrcontroller, genetic algorithm tutorial matlab, genetic algorithm vlsi 2012, mechanical engineering average salary,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  send me the algorithm on implementation of steganography based on lsb anannya 6 3,356 01-09-2014, 11:05 AM
Last Post: computer science crazy
  power theft detection Guest 1 481 09-09-2013, 09:43 AM
Last Post: study tips
  Brain Tumor Detection Using Matlab usman_sringeri 10 5,918 07-05-2013, 09:25 AM
Last Post: study tips
  digital image watermarking using Genetic algorithm Guest 0 557 24-04-2013, 12:03 PM
Last Post: Guest
  data base monitoring of power systems and fault detection using GPS Guest 0 542 15-04-2013, 06:19 PM
Last Post: Guest
  phase sequence detection with controlled voltage supply Guest 1 547 11-04-2013, 09:39 AM
Last Post: study tips
  obstacle detection and avoidance robot ankit.spmit 1 568 09-04-2013, 09:47 AM
Last Post: study tips
  Design of an Error Detection cvinoth2000 1 763 18-03-2013, 10:48 AM
Last Post: study tips
  computer virus Guest 1 538 15-03-2013, 10:02 AM
Last Post: study tips
  an algorithm for watermarking mobile phone colour images using bch code source code Guest 0 580 14-03-2013, 10:58 AM
Last Post: Guest