Hybrid Evolutionary Approach for IDS by Using Genetic and Poisson Distribution

  • Riya BilaiyaEmail author
  • Priyanka Ahlawat
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 98)


As Intrusion detection system (IDS) are obvious class under safety layout, therefore it may manage capacity with support to determine safety points in a framework. Numbers of several system supports under intrusion detection. Given research studying distinguishing in middle of hybrid documents opening approach & mono approach. Primary objective of the research are representing i.e. with support to hybrid document opening approaches may minimize duration difficulty in process as compared to mono approach. Particular structures were certified with support to kdd’99 document pair. An observational outcome significantly describing i.e. hybrid approaches with support to GA & Poisson distribution may uniquely minimize structure practicing duration of the framework & balancing perfectness of detections.


IDS Data mining Genetic algorithm Poisson distribution Intruder 


  1. 1.
    Patel, A., Qassim, Q., Wills, C.: Survey of intrusion detection and prevention systems. Inf. Manag. Comput. Secur. 18, 277–290 (2010)CrossRefGoogle Scholar
  2. 2.
    Beigh, B.M., Bashir, U., Chahcoo, M.: Intrusion detection and prevention system: issues and challenges. Int. J. Comput. Appl. (2013)Google Scholar
  3. 3.
    Aung, Y.Y., Min, M.M.: A collaborative intrusion detection based on K-means and projective adaptive resonance theory, pp. 1575–1579 (2017)Google Scholar
  4. 4.
    Kulkarni, R.D.: Using ensemble methods for improving classification of the KDD CUP ’99 data set. IOSR J. Comput. Eng. 16, 57–61 (2014)CrossRefGoogle Scholar
  5. 5.
    Syarif, I., Prugel-Bennett, A., Wills, G.: Unsupervised clustering approach for network anomaly detection (2012)Google Scholar
  6. 6.
    Alblawi, U., Suh, S.C., Kim, J.: Incorporating multiple supervised learning algorithms for effective intrusion detection (2014)Google Scholar
  7. 7.
    Choudhury, S., Bhowal, A.: Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection. In: 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), Chennai, pp. 89–95 (2015)Google Scholar
  8. 8.
    Ariafar, E., Kiani, R.: Intrusion detection system using an optimized framework based on datamining techniques. In: 2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, pp. 0785–0791 (2017)Google Scholar
  9. 9.
    Pal, S.: An integration of clustering and classification technique in software error detection. Afr. J. Comput. ICT 8, 11–20 (2015)Google Scholar
  10. 10.
    Malviya, V., Jain, A.: An efficient network intrusion detection based on decision tree classifier & simple k-mean clustering using dimensionality reduction – a review. Int. J. Recent Innov. Trends Comput. Commun. 3(2) (2015). ISSN 2321-8169Google Scholar
  11. 11.
    Foroushani, Z.A., Li, Y.: Intrusion detection system by using hybrid algorithm of data mining technique. Int. J. Innov. Res. Electr. Electron. Instrum. Control. Eng. 3 (2018). Special Issue 1Google Scholar
  12. 12.
    Rishabh, G., Soumya, S., Shubham, V., Swasti, S.: Intrusion detection system using SNORT. Int. Res. J. Eng. Technol. (IRJET). e-ISSN 2395-0056Google Scholar
  13. 13.
  14. 14.
    Ghafir, I., Prenosil, V., Svoboda, J., Hammoudeh, M.: A survey on network security monitoring systems. In: IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Vienna, pp. 77–82 (2016).

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNational Institute of Technology, KurukshetraKurukshetraIndia

Personalised recommendations