A. Alim, A. Islam, Md Khurshid Arifulazad, Md. Shamsul Alam, Alam
{"title":"Security Attack Detection using Genetic Algorithm (GA) in Policy Based Network","authors":"A. Alim, A. Islam, Md Khurshid Arifulazad, Md. Shamsul Alam, Alam","doi":"10.1109/ICICT.2007.375407","DOIUrl":null,"url":null,"abstract":"We present a modern approach of detecting the computer network security attacks (commonly termed as \"hacks\") by using an artificial intelligence method known as a genetic algorithm, which is a variant of stochastic beam search, which can be applied to a Policy Based Network. For this experiment, we develop the corresponding form of genetic algorithm and the form of fitness function to detect security attacks. Then we test the algorithm by a simulation program in TC (Turbo C) to gauge its effectiveness and the side effects of its execution. Finally, we give the indication for the necessary change in policy framework to deploy the functionality.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"109 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Information and Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICT.2007.375407","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
We present a modern approach of detecting the computer network security attacks (commonly termed as "hacks") by using an artificial intelligence method known as a genetic algorithm, which is a variant of stochastic beam search, which can be applied to a Policy Based Network. For this experiment, we develop the corresponding form of genetic algorithm and the form of fitness function to detect security attacks. Then we test the algorithm by a simulation program in TC (Turbo C) to gauge its effectiveness and the side effects of its execution. Finally, we give the indication for the necessary change in policy framework to deploy the functionality.