A Study on A Hybrid Approach of Genetic Algorithm & Fuzzy To Improve Anomaly or Intrusion
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 4
Abstract
Abstract: This paper describes a technique of applying Genetic Algorithm (GA) and fuzzy to network Intrusion Detection Systems (IDSs). A brief overview of a hybrid approach of genetic algorithm and fuzzy to improve anomaly or intrusion is presented. . This paper proposes genetic algorithm and fuzzy to generate that are able to detect anomalies and some specific intrusions. The goal of intrusion detection is to monitor network activities automatically, detect malicious attacks and to establish a proper architecture of the computer network security. Experimental results demonstrate that we can achieve better running time and accuracy with these modifications.
Authors and Affiliations
Er. Kamaldeep Kaur , Er. Simranjit Kaur Dhindsa
Analysis for Diagnosing Myocardial Ischemia by Detecting the Boundary of Left Ventricle in Echocardiography Sequences using GVF snake
Left ventricular performance, one of the hallmarks of coronary artery disease, can be detected by,echocardiography. Coronary artery disease (CAD) also known as myocardial ischemic heart disease (MIHD), is the most common...
Analytical Review of Feature Extraction Techniques for Automatic Speech Recognition
Speech recognition is a multileveled pattern recognition task, in which acoustical signals are examined and structured into a hierarchy of sub word units (e.g., phonemes), words, phrases, and sentences. Each l...
Predict Fault-Proneness Module Using Pattern Recognization (A Review)
Abstract: Background: The accurate prediction of where faults are likely to occur in code can help direct test effort, reduce costs and improve the quality of software. Objective of this paper is We investigate how...
BEST-1: A Light Weight Block Cipher
Abstract: The demand for applications involving Wireless Sensor Network (WSN) or RFID systems is increasing. The sensor in a WSN and RFID tag/reader in a RFID system are called resource constrained devices becaus...
Postgraduate Historical Research Format With Reference To Sudan and Nigerian Methods: A Comparative Perspective
This study titled “Postgraduate Historical Research format with reference to Sudan and Nigerian Methods” A comparative perspective has been established to justify historical research procedures, examine the concep...