Skip to main content

Evolutive Modeling of TCP/IP Network Traffic for Intrusion Detection

  • Conference paper
  • First Online:
  • 571 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1803))

Abstract

The detection of intrusions over computer networks can be cast to the task of detecting anomalous patterns of network tra_c. In this case, patterns of normal traffic have to be determined and compared against the current network traffic. Data mining systems based on Genetic Algorithms can contribute powerful search techniques for the acquisition of patterns of the network traffic from the large amount of data made available by audit tools.

In this paper we compare models of data traffic acquired by a system based on a distributed genetic algorithm with the ones acquired by a systembased on greedy heuristics. Also we discuss representation change of the network data and its impact over the performances of the traffic models.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cohen, W. (1995). Fast effective rule induction. In Proceedings of International Machine Learning Conference 1995, Lake Tahoe, CA. Morgan Kaufmann.

    Google Scholar 

  2. Denning, D. (1987). An intrusion detection model. IEEE Transaction on Software Engineering, SE-13(2):222–232.

    Article  Google Scholar 

  3. Ghosh, A., Schwartzbard, A., and Schatz, M. (1999). Learning program behavior profiles for intrusion detection. In USENIX Workshop on Intrusion Detection and Network Monitoring. USENIX Association.

    Google Scholar 

  4. Giordana, A. and Neri, F. (1995). Search-intensive concept induction. Evolutionary Computation, 3(4):375–416.

    Article  Google Scholar 

  5. Goldberg, D. (1989). Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley, Reading, Ma.

    MATH  Google Scholar 

  6. Kumar, S. and Spafford, E. (1994). A pattern matching model for misuse detection. In National Computer Security Conference, pages 11–21, Baltimore.

    Google Scholar 

  7. Lane, T. and Brodley, C. (1997). An application of machine learning to anomaly detection. In National Information Systems Security Conference, Baltimore.

    Google Scholar 

  8. Lane, T. and Brodley, C. (1998). Approaches to online learning and conceptual drift for user identification in computer security. Technical report, ECE and the COAST Laboratory, Purdue University, Coast TR 98-12.

    Google Scholar 

  9. Lee, W., Stolfo, S., and Mok, K. (1999). Mining in a data-flow environment: experience in network intrusion detection. In Knowledge Discovery and Data Mining KDD’99, pages 114–124. ACM Press.

    Google Scholar 

  10. Lippmann, R., Cunningham, R., Fried, D., Graf, I., Kendall, K., Webster, S., and Zissmann, M. (1999). Results of the DARPA 1998 offline intrusion detection evaluation. In Recent Advances in Intrusion Detection 99, RAID’99, W. Lafayette, IN. Purdue University.

    Google Scholar 

  11. Michalski, R. (1983). A theory and methodology of inductive learning. In Michalski, R., Carbonell, J., and Mitchell, T., editors, Machine Learning, an Artificial Intelligence Approach, volume I, pages 83–134. Morgan Kaufmann, Los Altos, CA.

    Google Scholar 

  12. Neri, F. and Saitta, L. (1996). Exploring the power of genetic search in learning symbolic classifiers. IEEE Trans. on Pattern Analysis and Machine Intelligence, PAMI-18:1135–1142.

    Article  Google Scholar 

  13. Quinlan, J. R. (1993). C4.5: Programs for Machine Learning. Morgan Kaufmann, California.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Neri, F. (2000). Evolutive Modeling of TCP/IP Network Traffic for Intrusion Detection. In: Cagnoni, S. (eds) Real-World Applications of Evolutionary Computing. EvoWorkshops 2000. Lecture Notes in Computer Science, vol 1803. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45561-2_21

Download citation

  • DOI: https://doi.org/10.1007/3-540-45561-2_21

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67353-8

  • Online ISBN: 978-3-540-45561-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics