Mining TCP/IP Traffic for Network Intrusion Detection by Using a Distributed Genetic Algorithm

Abstract

The detection of intrusions over computer networks (i.e., network access by non-authorized users)c an be cast to the task of detecting anomalous patterns of network traffic. In this case, models of normal traffic have to be determined and compared against the current network traffic. Data mining systems based on Genetic Algorithms can contribute powerful search techniques for the acquisition of patterns of the network traffic from the large amount of data made available by audit tools. We compare models of network traffic acquired by a system based on a distributed genetic algorithm with the ones acquired by a system based on greedy heuristics. Also we discuss representation change of the network data and its impact over the performances of the traffic models. Network data made available from the Information Exploration Shootout project and the 1998 DARPA Intrusion Detection Evaluation have been chosen as experimental testbed.

Cite

Text

Neri. "Mining TCP/IP Traffic for Network Intrusion Detection by Using a Distributed Genetic Algorithm." European Conference on Machine Learning, 2000. doi:10.1007/3-540-45164-1_33

Markdown

[Neri. "Mining TCP/IP Traffic for Network Intrusion Detection by Using a Distributed Genetic Algorithm." European Conference on Machine Learning, 2000.](https://mlanthology.org/ecmlpkdd/2000/neri2000ecml-mining/) doi:10.1007/3-540-45164-1_33

BibTeX

@inproceedings{neri2000ecml-mining,
  title     = {{Mining TCP/IP Traffic for Network Intrusion Detection by Using a Distributed Genetic Algorithm}},
  author    = {Neri, Filippo},
  booktitle = {European Conference on Machine Learning},
  year      = {2000},
  pages     = {313-322},
  doi       = {10.1007/3-540-45164-1_33},
  url       = {https://mlanthology.org/ecmlpkdd/2000/neri2000ecml-mining/}
}