SlideShare ist ein Scribd-Unternehmen logo
1 von 26
PROJECT SEMINARPROJECT SEMINAR
OnOn
““Network Intrusion DetectionNetwork Intrusion Detection
using Genetic Algorithmusing Genetic Algorithm””
Presented byPresented by
Under the Guidance ofUnder the Guidance of CoordinatorsCoordinators
Chakrapani D.SChakrapani D.S [ B.E, M.tech ][ B.E, M.tech ]
Lecturer, Dept of CSELecturer, Dept of CSE
ChetanChetan K. RK. R [ B.E, M.Tech ][ B.E, M.Tech ]
Sr. Lecturer , Dept of CSESr. Lecturer , Dept of CSE
Poornima K.MPoornima K.M [ B.E, M.Tech ][ B.E, M.Tech ]
Asst. Professor, Dept of CSEAsst. Professor, Dept of CSE
Jawaharlal Nehru National College of Engineering,Jawaharlal Nehru National College of Engineering,
ShimogaShimoga
HITESH KUMAR. P 4JN07CS027HITESH KUMAR. P 4JN07CS027
SAGAR. USAGAR. U 4JN07CS0704JN07CS070
SANDEEP TANTRY. K 4JN07CS072SANDEEP TANTRY. K 4JN07CS072
SHARATH KUMAR. K 4JN07CS078SHARATH KUMAR. K 4JN07CS078
Contents
1. Introduction
1.1 Introduction to Intrusion Detection System(IDS).
1.2 Introduction to genetic algorithm.
2. Problem Specification
2.1 Major problems addressed.
2.2 Challenges faced.
2.3 Scope of the project.
3. Literature Survey
3.1 Features & Technology used.
3.2 Drawbacks & Solutions.
4. System Architecture
4.1 Workflow diagrams & Modules.
Introduction to IntrusionIntroduction to Intrusion
Detection SystemDetection System
 Intrusion.Intrusion.
 ExternalExternal
 InternalInternal
 Intrusion Detection System.Intrusion Detection System.
 Misuse vs Anomaly.Misuse vs Anomaly.
 Host-based vs Network-based.Host-based vs Network-based.
 IDS - one piece of the whole Security puzzle.
 Lots of people use Firewall and Router logs for Intrusion
Detection .
 Important Security architecture but does not solve all
your problems .
 Mostly signature based .
 Example (Denial of Service [ DoS ] Attack).
Introduction-Genetic Algorithm
 Definition.
 Background Theory.
 A simple Genetic Algorithm.
StartStart
GenerateGenerate
randomrandom
populationpopulation
EvaluationEvaluation
FunctionFunction
OptimizationOptimization
Criteria met?Criteria met?
BestBest
IndividualsIndividuals
ResultResult
SelectionSelection
CrossoverCrossoverMutationMutation
yesyes
nono
GenerateGenerate
a newa new
PopulationPopulation
Applications.
Military
Information security in some multinational agencies.
Intrusion Prevention System.
Significance.
Network traffic analysis .
Detection of various attacks.
Major problems
 Security infrastructure.
 Threats originating from outside.
 Support Issues (OS, Platform)
 Evaluation Parameters.
Challenges
 Frequency vs Difficulty level.
 Hacktivists or cyber terrorists
 Deployment & Myths
 Using IDS in fully switched networks
 Interpreting all the data being presented
 Encryption, VPN, Tunnels
 Performance
 Response team.
Scope
 Combining knowledge from different sensors into a
Standard rule base.
 Local Area Security.
 Security purpose in main servers across the world.
 Intelligence Intrusion Detection System(IIDS) is an
ongoing Project in Mississippi University.
Literature Survey
• “The Integration of security sensors into the
Intelligent Intrusion Detection System (IIDS) in
a cluster environment” by Li, Wei
– In this paper the author has described the some
methods to detect Intrusion in Network.
• “Network Intrusion Detection” by Stephen
Northcutt, Judy Novak
– In this book the author has described some concepts
related to networks and concepts related to Intrusion
Detection
• “Principles of Information Security” - Michel E.
Whitman and Herbert J. Mattord
– In this paper the author has described about concepts
in network security completely.
• “Genetic Algorithms with Dynamic Niche
Sharing for Multimodal Function Optimization.”
by Miller, Brad. L. and Michael J. Shaw.
– In this paper the author has described about the
concepts of Genetic algorithm and its applications
(usage).
Applying Genetic Algorithm to IDS
• Genetic algorithms can be used to evolve simple rules for
network traffic.
The rules stored in the rule base are usually in the
following form
if { condition } then { act }
Eg. if {the connection has following information: source
IP address 124.12.5.18; destination IP
address:130.18.206.55; destination port number: 21;
connection time: 10.1 seconds }
then {stop the connection}
Rule definition for connection and range
of values of each field
AttributeAttribute Range Eg. Value DescriptionsRange Eg. Value Descriptions
0.0.0.0 – 255.0.0.0.0 – 255. d1.0b.**.** A subnet withd1.0b.**.** A subnet with
resperespe
Source IPSource IP 255.255.255255.255.255 (209.11.??.??) -ctive range of IP(209.11.??.??) -ctive range of IP
Destination IP 0.0.0.0 – 255.Destination IP 0.0.0.0 – 255. 82.12.b*.**82.12.b*.** A subnet with respA subnet with resp
255.255.255255.255.255 -ective range of IP-ective range of IP
Source Port no 0 - 65535Source Port no 0 - 65535 4233542335 Source Port noSource Port no
Dest Port no 0 - 65535 00080Dest Port no 0 - 65535 00080 HTTP ServiceHTTP Service
Duration 0 - 99999999 00000482 ConnectionDuration 0 - 99999999 00000482 Connection
DurationDuration
StateState 1 – 121 – 12 1111 (Internal Use)(Internal Use)
ProtocolProtocol 1 – 91 – 9 22 TCPTCP
ProtocolProtocol
Bytes sent 0 – 9999999999 0000007320Bytes sent 0 – 9999999999 0000007320 Originator sends reOriginator sends re
Chromosome structure for example
( d, 1, 0, b, -1, -1, -1, -1, 8, 2, 1, 2, 1, 2, b, -1, -1,( d, 1, 0, b, -1, -1, -1, -1, 8, 2, 1, 2, 1, 2, b, -1, -1,
-1, 4, 2, 3, 3, 5, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 4, 8, 2,-1, 4, 2, 3, 3, 5, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 4, 8, 2,
1, 1, 2, 0, 0, 0, 0, 0, 0, 7, 3, 2, 0, 0, 0, 0, 0, 0, 3,1, 1, 2, 0, 0, 0, 0, 0, 0, 7, 3, 2, 0, 0, 0, 0, 0, 0, 3,
8, 9, 1, 1 )8, 9, 1, 1 )
Drawbacks of other existing system
 All the internal rules should be defined.
 complex or loosely defined problems.
 Monitoring systems.
 Exact match for rules.
 About 400 different IDS on the market-Only a few are
scalable, and easy to maintain.
System Architecture
StartStart
GenerateGenerate
randomrandom
populationpopulation
EvaluationEvaluation
FunctionFunction
OptimizationOptimization
Criteria met?Criteria met?
BestBest
IndividualsIndividuals
ResultResult
SelectionSelection
CrossoverCrossoverMutationMutation
yesyes
nono
GenerateGenerate
a newa new
PopulationPopulation
Data setData set NetworkNetwork
sniffersniffer GAGA
Rule SetRule Set
RuleRule
BaseBase
Rule Base ModuleRule Base Module
Evaluation Function
= Outcome – Suspicious level= Outcome – Suspicious level
5757
Outcome =Outcome = Matched * Weight(i)Matched * Weight(i)
i=1i=1
Fitness = 1 - PenaltyFitness = 1 - Penalty
Penalty = (Penalty = ( * ranking )* ranking )
100100
Father
Mother
Crossover offspring
Point
Child 1
Child 2
Crossover
• For example,
209.103.51.134 and 101.1.25.193
209.103.25.193 and 101.1.51.134.
11 1 0 1 0 11 0 1 0 1 Before MutationBefore Mutation
1 0 0 0 0 11 0 0 0 0 1 After MutationAfter Mutation
MutationMutation
Preferred Language
Java
Platform
Windows
 Li, Wei. 2002. “The integration of security sensors intoLi, Wei. 2002. “The integration of security sensors into
the Intelligent Intrusion Detection System (IIDS) in athe Intelligent Intrusion Detection System (IIDS) in a
cluster environment.” Master’s Project Report. Departmentcluster environment.” Master’s Project Report. Department
of Computer Science, Mississippi State University.of Computer Science, Mississippi State University.
 Miller, Brad. L. and Michael J. Shaw. 1996. “GeneticMiller, Brad. L. and Michael J. Shaw. 1996. “Genetic
Algorithms with Dynamic Niche Sharing for MultimodalAlgorithms with Dynamic Niche Sharing for Multimodal
Function Optimization.”Function Optimization.” In Proceedings of IEEEIn Proceedings of IEEE
International Conf. on Evolutionary Computation.International Conf. on Evolutionary Computation.
 ““Network Intrusion Detection” by Stephen Northcutt,Network Intrusion Detection” by Stephen Northcutt,
Judy Novak ( 3Judy Novak ( 3rdrd
edition).edition).
 ““Principles of Information SecurityPrinciples of Information Security” - Michel E. Whitman and” - Michel E. Whitman and
Herbert J. Mattord, (2Herbert J. Mattord, (2ndnd
Edition)Edition)
REFERENCESREFERENCES
Thanking youThanking you

Weitere ähnliche Inhalte

Was ist angesagt?

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Akhil Kumar
 
Intrusion detection systems
Intrusion detection systemsIntrusion detection systems
Intrusion detection systems
Seraphic Nazir
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networks
guest1b5f71
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
Apoorv Pandey
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And Prevention
Nicholas Davis
 

Was ist angesagt? (19)

Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
 
Ids(final)
Ids(final)Ids(final)
Ids(final)
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection systems
Intrusion detection systemsIntrusion detection systems
Intrusion detection systems
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
 
NIDS ppt
NIDS pptNIDS ppt
NIDS ppt
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networks
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
A hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environmentsA hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environments
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS security
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And Prevention
 

Andere mochten auch

с- ми_за-откриване_на_атаки(ids)
с- ми_за-откриване_на_атаки(ids)с- ми_за-откриване_на_атаки(ids)
с- ми_за-откриване_на_атаки(ids)
ssalieva
 
Algoritmos Genéticos
Algoritmos GenéticosAlgoritmos Genéticos
Algoritmos Genéticos
ESCOM
 
Keylogger
KeyloggerKeylogger
Keylogger
frank
 

Andere mochten auch (18)

Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Data Science - Part XIV - Genetic Algorithms
Data Science - Part XIV - Genetic AlgorithmsData Science - Part XIV - Genetic Algorithms
Data Science - Part XIV - Genetic Algorithms
 
Wireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security SystemWireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security System
 
с- ми_за-откриване_на_атаки(ids)
с- ми_за-откриване_на_атаки(ids)с- ми_за-откриване_на_атаки(ids)
с- ми_за-откриване_на_атаки(ids)
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
 
Keylogger
KeyloggerKeylogger
Keylogger
 
Algoritmos Genéticos
Algoritmos GenéticosAlgoritmos Genéticos
Algoritmos Genéticos
 
Lecture 29 genetic algorithm-example
Lecture 29 genetic algorithm-exampleLecture 29 genetic algorithm-example
Lecture 29 genetic algorithm-example
 
Keylogger
KeyloggerKeylogger
Keylogger
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
genetic algorithm based music recommender system
genetic algorithm based music recommender systemgenetic algorithm based music recommender system
genetic algorithm based music recommender system
 
What is keylogger
What is keyloggerWhat is keylogger
What is keylogger
 
Genetic Algorithm by Example
Genetic Algorithm by ExampleGenetic Algorithm by Example
Genetic Algorithm by Example
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 

Ähnlich wie Using Genetic algorithm for Network Intrusion Detection

01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
honey725342
 
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561Vishwanath rakesh ece 561
Vishwanath rakesh ece 561
RAKESH_CSU
 

Ähnlich wie Using Genetic algorithm for Network Intrusion Detection (20)

Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
 
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
 
Using Ansible Tower to implement security policies and telemetry streaming fo...
Using Ansible Tower to implement security policies and telemetry streaming fo...Using Ansible Tower to implement security policies and telemetry streaming fo...
Using Ansible Tower to implement security policies and telemetry streaming fo...
 
Micro profile and istio
Micro profile and istioMicro profile and istio
Micro profile and istio
 
Distributed Deep Learning Using Java on the Client and in the Cloud
Distributed Deep Learning Using Java on the Client and in the CloudDistributed Deep Learning Using Java on the Client and in the Cloud
Distributed Deep Learning Using Java on the Client and in the Cloud
 
4 wireless pan, lan and man
4 wireless pan, lan and man4 wireless pan, lan and man
4 wireless pan, lan and man
 
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
 
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java Projects
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
 
Low Priced And Efficient Energy Replica Detection In WSN
Low Priced And Efficient Energy Replica Detection In WSNLow Priced And Efficient Energy Replica Detection In WSN
Low Priced And Efficient Energy Replica Detection In WSN
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java Projects
 
WiPAt
WiPAtWiPAt
WiPAt
 
Generator of pseudorandom sequences
Generator of pseudorandom sequences Generator of pseudorandom sequences
Generator of pseudorandom sequences
 
ICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptxICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptx
 
SAST, CWE, SEI CERT and other smart words from the information security world
SAST, CWE, SEI CERT and other smart words from the information security worldSAST, CWE, SEI CERT and other smart words from the information security world
SAST, CWE, SEI CERT and other smart words from the information security world
 
Network Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxNetwork Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptx
 
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561Vishwanath rakesh ece 561
Vishwanath rakesh ece 561
 
It’s All In The Name - Deral Heiland
It’s All In The Name - Deral HeilandIt’s All In The Name - Deral Heiland
It’s All In The Name - Deral Heiland
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Using Genetic algorithm for Network Intrusion Detection

  • 1. PROJECT SEMINARPROJECT SEMINAR OnOn ““Network Intrusion DetectionNetwork Intrusion Detection using Genetic Algorithmusing Genetic Algorithm”” Presented byPresented by Under the Guidance ofUnder the Guidance of CoordinatorsCoordinators Chakrapani D.SChakrapani D.S [ B.E, M.tech ][ B.E, M.tech ] Lecturer, Dept of CSELecturer, Dept of CSE ChetanChetan K. RK. R [ B.E, M.Tech ][ B.E, M.Tech ] Sr. Lecturer , Dept of CSESr. Lecturer , Dept of CSE Poornima K.MPoornima K.M [ B.E, M.Tech ][ B.E, M.Tech ] Asst. Professor, Dept of CSEAsst. Professor, Dept of CSE Jawaharlal Nehru National College of Engineering,Jawaharlal Nehru National College of Engineering, ShimogaShimoga HITESH KUMAR. P 4JN07CS027HITESH KUMAR. P 4JN07CS027 SAGAR. USAGAR. U 4JN07CS0704JN07CS070 SANDEEP TANTRY. K 4JN07CS072SANDEEP TANTRY. K 4JN07CS072 SHARATH KUMAR. K 4JN07CS078SHARATH KUMAR. K 4JN07CS078
  • 2. Contents 1. Introduction 1.1 Introduction to Intrusion Detection System(IDS). 1.2 Introduction to genetic algorithm. 2. Problem Specification 2.1 Major problems addressed. 2.2 Challenges faced. 2.3 Scope of the project. 3. Literature Survey 3.1 Features & Technology used. 3.2 Drawbacks & Solutions. 4. System Architecture 4.1 Workflow diagrams & Modules.
  • 3. Introduction to IntrusionIntroduction to Intrusion Detection SystemDetection System  Intrusion.Intrusion.  ExternalExternal  InternalInternal  Intrusion Detection System.Intrusion Detection System.  Misuse vs Anomaly.Misuse vs Anomaly.  Host-based vs Network-based.Host-based vs Network-based.
  • 4.  IDS - one piece of the whole Security puzzle.  Lots of people use Firewall and Router logs for Intrusion Detection .  Important Security architecture but does not solve all your problems .  Mostly signature based .  Example (Denial of Service [ DoS ] Attack).
  • 5. Introduction-Genetic Algorithm  Definition.  Background Theory.  A simple Genetic Algorithm. StartStart GenerateGenerate randomrandom populationpopulation EvaluationEvaluation FunctionFunction OptimizationOptimization Criteria met?Criteria met? BestBest IndividualsIndividuals ResultResult SelectionSelection CrossoverCrossoverMutationMutation yesyes nono GenerateGenerate a newa new PopulationPopulation
  • 6. Applications. Military Information security in some multinational agencies. Intrusion Prevention System. Significance. Network traffic analysis . Detection of various attacks.
  • 7. Major problems  Security infrastructure.  Threats originating from outside.  Support Issues (OS, Platform)  Evaluation Parameters.
  • 8. Challenges  Frequency vs Difficulty level.  Hacktivists or cyber terrorists  Deployment & Myths  Using IDS in fully switched networks  Interpreting all the data being presented  Encryption, VPN, Tunnels  Performance  Response team.
  • 9. Scope  Combining knowledge from different sensors into a Standard rule base.  Local Area Security.  Security purpose in main servers across the world.  Intelligence Intrusion Detection System(IIDS) is an ongoing Project in Mississippi University.
  • 10. Literature Survey • “The Integration of security sensors into the Intelligent Intrusion Detection System (IIDS) in a cluster environment” by Li, Wei – In this paper the author has described the some methods to detect Intrusion in Network.
  • 11. • “Network Intrusion Detection” by Stephen Northcutt, Judy Novak – In this book the author has described some concepts related to networks and concepts related to Intrusion Detection
  • 12. • “Principles of Information Security” - Michel E. Whitman and Herbert J. Mattord – In this paper the author has described about concepts in network security completely.
  • 13. • “Genetic Algorithms with Dynamic Niche Sharing for Multimodal Function Optimization.” by Miller, Brad. L. and Michael J. Shaw. – In this paper the author has described about the concepts of Genetic algorithm and its applications (usage).
  • 14. Applying Genetic Algorithm to IDS • Genetic algorithms can be used to evolve simple rules for network traffic. The rules stored in the rule base are usually in the following form if { condition } then { act } Eg. if {the connection has following information: source IP address 124.12.5.18; destination IP address:130.18.206.55; destination port number: 21; connection time: 10.1 seconds } then {stop the connection}
  • 15. Rule definition for connection and range of values of each field AttributeAttribute Range Eg. Value DescriptionsRange Eg. Value Descriptions 0.0.0.0 – 255.0.0.0.0 – 255. d1.0b.**.** A subnet withd1.0b.**.** A subnet with resperespe Source IPSource IP 255.255.255255.255.255 (209.11.??.??) -ctive range of IP(209.11.??.??) -ctive range of IP Destination IP 0.0.0.0 – 255.Destination IP 0.0.0.0 – 255. 82.12.b*.**82.12.b*.** A subnet with respA subnet with resp 255.255.255255.255.255 -ective range of IP-ective range of IP Source Port no 0 - 65535Source Port no 0 - 65535 4233542335 Source Port noSource Port no Dest Port no 0 - 65535 00080Dest Port no 0 - 65535 00080 HTTP ServiceHTTP Service Duration 0 - 99999999 00000482 ConnectionDuration 0 - 99999999 00000482 Connection DurationDuration StateState 1 – 121 – 12 1111 (Internal Use)(Internal Use) ProtocolProtocol 1 – 91 – 9 22 TCPTCP ProtocolProtocol Bytes sent 0 – 9999999999 0000007320Bytes sent 0 – 9999999999 0000007320 Originator sends reOriginator sends re
  • 16. Chromosome structure for example ( d, 1, 0, b, -1, -1, -1, -1, 8, 2, 1, 2, 1, 2, b, -1, -1,( d, 1, 0, b, -1, -1, -1, -1, 8, 2, 1, 2, 1, 2, b, -1, -1, -1, 4, 2, 3, 3, 5, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 4, 8, 2,-1, 4, 2, 3, 3, 5, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 4, 8, 2, 1, 1, 2, 0, 0, 0, 0, 0, 0, 7, 3, 2, 0, 0, 0, 0, 0, 0, 3,1, 1, 2, 0, 0, 0, 0, 0, 0, 7, 3, 2, 0, 0, 0, 0, 0, 0, 3, 8, 9, 1, 1 )8, 9, 1, 1 )
  • 17. Drawbacks of other existing system  All the internal rules should be defined.  complex or loosely defined problems.  Monitoring systems.  Exact match for rules.  About 400 different IDS on the market-Only a few are scalable, and easy to maintain.
  • 18. System Architecture StartStart GenerateGenerate randomrandom populationpopulation EvaluationEvaluation FunctionFunction OptimizationOptimization Criteria met?Criteria met? BestBest IndividualsIndividuals ResultResult SelectionSelection CrossoverCrossoverMutationMutation yesyes nono GenerateGenerate a newa new PopulationPopulation
  • 19. Data setData set NetworkNetwork sniffersniffer GAGA Rule SetRule Set RuleRule BaseBase Rule Base ModuleRule Base Module
  • 20. Evaluation Function = Outcome – Suspicious level= Outcome – Suspicious level 5757 Outcome =Outcome = Matched * Weight(i)Matched * Weight(i) i=1i=1 Fitness = 1 - PenaltyFitness = 1 - Penalty Penalty = (Penalty = ( * ranking )* ranking ) 100100
  • 22. • For example, 209.103.51.134 and 101.1.25.193 209.103.25.193 and 101.1.51.134.
  • 23. 11 1 0 1 0 11 0 1 0 1 Before MutationBefore Mutation 1 0 0 0 0 11 0 0 0 0 1 After MutationAfter Mutation MutationMutation
  • 25.  Li, Wei. 2002. “The integration of security sensors intoLi, Wei. 2002. “The integration of security sensors into the Intelligent Intrusion Detection System (IIDS) in athe Intelligent Intrusion Detection System (IIDS) in a cluster environment.” Master’s Project Report. Departmentcluster environment.” Master’s Project Report. Department of Computer Science, Mississippi State University.of Computer Science, Mississippi State University.  Miller, Brad. L. and Michael J. Shaw. 1996. “GeneticMiller, Brad. L. and Michael J. Shaw. 1996. “Genetic Algorithms with Dynamic Niche Sharing for MultimodalAlgorithms with Dynamic Niche Sharing for Multimodal Function Optimization.”Function Optimization.” In Proceedings of IEEEIn Proceedings of IEEE International Conf. on Evolutionary Computation.International Conf. on Evolutionary Computation.  ““Network Intrusion Detection” by Stephen Northcutt,Network Intrusion Detection” by Stephen Northcutt, Judy Novak ( 3Judy Novak ( 3rdrd edition).edition).  ““Principles of Information SecurityPrinciples of Information Security” - Michel E. Whitman and” - Michel E. Whitman and Herbert J. Mattord, (2Herbert J. Mattord, (2ndnd Edition)Edition) REFERENCESREFERENCES