Applying Genetic Algorithm to Intrusion Detection System
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 4
Abstract
" Now a days it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. With the rapid expansion of Internet in recent years; computer systems are facing increased number of security threats. Therefore, unwanted intrusions take place when the actual software systems are running. So Intrusion Detection Systems have become a needful component in terms of computer and network security. In this paper, we present an Intrusion Detection System (IDS), by applying genetic algorithm (GA) to efficiently detect various types of network attacks. Parameters and evolution processes for GA are discussed. Also impact on rate of GA operators in IDS for misuse is discussed. "
Optimal Query Processing in Semantic Web using Cloud Computing
Optimal Query Processing in Semantic Web using Cloud Computing
Location Based Query Processing For Providing Privacy to Exploit Service Similarity: A Survey
Location Based Application(LBA) provide location based services(LBS) by using queries called location based queries(LBQ). The result of these queries is based on location of mobile user. Privacy and Usability are two imp...
A Defence Strategy against Flooding Attack Using Puzzles by Game Theory
Security issues have become a major issue in recent years due to the advancement of technology in networking and its use in a destructive way. A number of Defence strategies have been devised to overcome the flooding att...
Length-Weight Relationship and Condition Factor of Penaeus monodon Fabricius, 1798 in Northern Odisha, India
Post larvae of Penaeus monodon were collected from cultured ponds in the coastal areas of northern Odisha in 2009.Length and weight measurements were taken every 30 days interval for the study of growth and length-weight...
Survey on Cluster Based Routing Protocol in MANETs
" In Mobile Ad-hoc Networks (MANETs), many clustering schemes are proposed. The systematic classification is used. These schemes provides the better understanding and for better improvements. The Cluster Based Routing Pr...