SlideShare une entreprise Scribd logo
1  sur  26
PROJECT SEMINARPROJECT SEMINAR
OnOn
““Network Intrusion DetectionNetwork Intrusion Detection
using Genetic Algorithmusing Genetic Algorithm””
Presented byPresented by
Under the Guidance ofUnder the Guidance of CoordinatorsCoordinators
Chakrapani D.SChakrapani D.S [ B.E, M.tech ][ B.E, M.tech ]
Lecturer, Dept of CSELecturer, Dept of CSE
ChetanChetan K. RK. R [ B.E, M.Tech ][ B.E, M.Tech ]
Sr. Lecturer , Dept of CSESr. Lecturer , Dept of CSE
Poornima K.MPoornima K.M [ B.E, M.Tech ][ B.E, M.Tech ]
Asst. Professor, Dept of CSEAsst. Professor, Dept of CSE
Jawaharlal Nehru National College of Engineering,Jawaharlal Nehru National College of Engineering,
ShimogaShimoga
HITESH KUMAR. P 4JN07CS027HITESH KUMAR. P 4JN07CS027
SAGAR. USAGAR. U 4JN07CS0704JN07CS070
SANDEEP TANTRY. K 4JN07CS072SANDEEP TANTRY. K 4JN07CS072
SHARATH KUMAR. K 4JN07CS078SHARATH KUMAR. K 4JN07CS078
Contents
1. Introduction
1.1 Introduction to Intrusion Detection System(IDS).
1.2 Introduction to genetic algorithm.
2. Problem Specification
2.1 Major problems addressed.
2.2 Challenges faced.
2.3 Scope of the project.
3. Literature Survey
3.1 Features & Technology used.
3.2 Drawbacks & Solutions.
4. System Architecture
4.1 Workflow diagrams & Modules.
Introduction to IntrusionIntroduction to Intrusion
Detection SystemDetection System
 Intrusion.Intrusion.
 ExternalExternal
 InternalInternal
 Intrusion Detection System.Intrusion Detection System.
 Misuse vs Anomaly.Misuse vs Anomaly.
 Host-based vs Network-based.Host-based vs Network-based.
 IDS - one piece of the whole Security puzzle.
 Lots of people use Firewall and Router logs for Intrusion
Detection .
 Important Security architecture but does not solve all
your problems .
 Mostly signature based .
 Example (Denial of Service [ DoS ] Attack).
Introduction-Genetic Algorithm
 Definition.
 Background Theory.
 A simple Genetic Algorithm.
StartStart
GenerateGenerate
randomrandom
populationpopulation
EvaluationEvaluation
FunctionFunction
OptimizationOptimization
Criteria met?Criteria met?
BestBest
IndividualsIndividuals
ResultResult
SelectionSelection
CrossoverCrossoverMutationMutation
yesyes
nono
GenerateGenerate
a newa new
PopulationPopulation
Applications.
Military
Information security in some multinational agencies.
Intrusion Prevention System.
Significance.
Network traffic analysis .
Detection of various attacks.
Major problems
 Security infrastructure.
 Threats originating from outside.
 Support Issues (OS, Platform)
 Evaluation Parameters.
Challenges
 Frequency vs Difficulty level.
 Hacktivists or cyber terrorists
 Deployment & Myths
 Using IDS in fully switched networks
 Interpreting all the data being presented
 Encryption, VPN, Tunnels
 Performance
 Response team.
Scope
 Combining knowledge from different sensors into a
Standard rule base.
 Local Area Security.
 Security purpose in main servers across the world.
 Intelligence Intrusion Detection System(IIDS) is an
ongoing Project in Mississippi University.
Literature Survey
• “The Integration of security sensors into the
Intelligent Intrusion Detection System (IIDS) in
a cluster environment” by Li, Wei
– In this paper the author has described the some
methods to detect Intrusion in Network.
• “Network Intrusion Detection” by Stephen
Northcutt, Judy Novak
– In this book the author has described some concepts
related to networks and concepts related to Intrusion
Detection
• “Principles of Information Security” - Michel E.
Whitman and Herbert J. Mattord
– In this paper the author has described about concepts
in network security completely.
• “Genetic Algorithms with Dynamic Niche
Sharing for Multimodal Function Optimization.”
by Miller, Brad. L. and Michael J. Shaw.
– In this paper the author has described about the
concepts of Genetic algorithm and its applications
(usage).
Applying Genetic Algorithm to IDS
• Genetic algorithms can be used to evolve simple rules for
network traffic.
The rules stored in the rule base are usually in the
following form
if { condition } then { act }
Eg. if {the connection has following information: source
IP address 124.12.5.18; destination IP
address:130.18.206.55; destination port number: 21;
connection time: 10.1 seconds }
then {stop the connection}
Rule definition for connection and range
of values of each field
AttributeAttribute Range Eg. Value DescriptionsRange Eg. Value Descriptions
0.0.0.0 – 255.0.0.0.0 – 255. d1.0b.**.** A subnet withd1.0b.**.** A subnet with
resperespe
Source IPSource IP 255.255.255255.255.255 (209.11.??.??) -ctive range of IP(209.11.??.??) -ctive range of IP
Destination IP 0.0.0.0 – 255.Destination IP 0.0.0.0 – 255. 82.12.b*.**82.12.b*.** A subnet with respA subnet with resp
255.255.255255.255.255 -ective range of IP-ective range of IP
Source Port no 0 - 65535Source Port no 0 - 65535 4233542335 Source Port noSource Port no
Dest Port no 0 - 65535 00080Dest Port no 0 - 65535 00080 HTTP ServiceHTTP Service
Duration 0 - 99999999 00000482 ConnectionDuration 0 - 99999999 00000482 Connection
DurationDuration
StateState 1 – 121 – 12 1111 (Internal Use)(Internal Use)
ProtocolProtocol 1 – 91 – 9 22 TCPTCP
ProtocolProtocol
Bytes sent 0 – 9999999999 0000007320Bytes sent 0 – 9999999999 0000007320 Originator sends reOriginator sends re
Chromosome structure for example
( d, 1, 0, b, -1, -1, -1, -1, 8, 2, 1, 2, 1, 2, b, -1, -1,( d, 1, 0, b, -1, -1, -1, -1, 8, 2, 1, 2, 1, 2, b, -1, -1,
-1, 4, 2, 3, 3, 5, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 4, 8, 2,-1, 4, 2, 3, 3, 5, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 4, 8, 2,
1, 1, 2, 0, 0, 0, 0, 0, 0, 7, 3, 2, 0, 0, 0, 0, 0, 0, 3,1, 1, 2, 0, 0, 0, 0, 0, 0, 7, 3, 2, 0, 0, 0, 0, 0, 0, 3,
8, 9, 1, 1 )8, 9, 1, 1 )
Drawbacks of other existing system
 All the internal rules should be defined.
 complex or loosely defined problems.
 Monitoring systems.
 Exact match for rules.
 About 400 different IDS on the market-Only a few are
scalable, and easy to maintain.
System Architecture
StartStart
GenerateGenerate
randomrandom
populationpopulation
EvaluationEvaluation
FunctionFunction
OptimizationOptimization
Criteria met?Criteria met?
BestBest
IndividualsIndividuals
ResultResult
SelectionSelection
CrossoverCrossoverMutationMutation
yesyes
nono
GenerateGenerate
a newa new
PopulationPopulation
Data setData set NetworkNetwork
sniffersniffer GAGA
Rule SetRule Set
RuleRule
BaseBase
Rule Base ModuleRule Base Module
Evaluation Function
= Outcome – Suspicious level= Outcome – Suspicious level
5757
Outcome =Outcome = Matched * Weight(i)Matched * Weight(i)
i=1i=1
Fitness = 1 - PenaltyFitness = 1 - Penalty
Penalty = (Penalty = ( * ranking )* ranking )
100100
Father
Mother
Crossover offspring
Point
Child 1
Child 2
Crossover
• For example,
209.103.51.134 and 101.1.25.193
209.103.25.193 and 101.1.51.134.
11 1 0 1 0 11 0 1 0 1 Before MutationBefore Mutation
1 0 0 0 0 11 0 0 0 0 1 After MutationAfter Mutation
MutationMutation
Preferred Language
Java
Platform
Windows
 Li, Wei. 2002. “The integration of security sensors intoLi, Wei. 2002. “The integration of security sensors into
the Intelligent Intrusion Detection System (IIDS) in athe Intelligent Intrusion Detection System (IIDS) in a
cluster environment.” Master’s Project Report. Departmentcluster environment.” Master’s Project Report. Department
of Computer Science, Mississippi State University.of Computer Science, Mississippi State University.
 Miller, Brad. L. and Michael J. Shaw. 1996. “GeneticMiller, Brad. L. and Michael J. Shaw. 1996. “Genetic
Algorithms with Dynamic Niche Sharing for MultimodalAlgorithms with Dynamic Niche Sharing for Multimodal
Function Optimization.”Function Optimization.” In Proceedings of IEEEIn Proceedings of IEEE
International Conf. on Evolutionary Computation.International Conf. on Evolutionary Computation.
 ““Network Intrusion Detection” by Stephen Northcutt,Network Intrusion Detection” by Stephen Northcutt,
Judy Novak ( 3Judy Novak ( 3rdrd
edition).edition).
 ““Principles of Information SecurityPrinciples of Information Security” - Michel E. Whitman and” - Michel E. Whitman and
Herbert J. Mattord, (2Herbert J. Mattord, (2ndnd
Edition)Edition)
REFERENCESREFERENCES
Thanking youThanking you

Contenu connexe

Tendances

Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkEng. Mohammed Ahmed Siddiqui
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systemssamis
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
Intrusion detection systems
Intrusion detection systemsIntrusion detection systems
Intrusion detection systemsSeraphic Nazir
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsPaul Green
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemMohit Belwal
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networksguest1b5f71
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1whitehat 'People'
 
A hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environmentsA hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environmentsMohamed Jelidi
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)Aj Maurya
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortDisha Bedi
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESTrinity Dwarka
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMApoorv Pandey
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS securityClarejenson
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And PreventionNicholas Davis
 

Tendances (19)

Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
 
Ids(final)
Ids(final)Ids(final)
Ids(final)
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection systems
Intrusion detection systemsIntrusion detection systems
Intrusion detection systems
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
 
NIDS ppt
NIDS pptNIDS ppt
NIDS ppt
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networks
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
A hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environmentsA hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environments
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS security
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And Prevention
 

En vedette

Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Data Science - Part XIV - Genetic Algorithms
Data Science - Part XIV - Genetic AlgorithmsData Science - Part XIV - Genetic Algorithms
Data Science - Part XIV - Genetic AlgorithmsDerek Kane
 
Wireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security SystemWireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security SystemJoseph Garcia
 
с- ми_за-откриване_на_атаки(ids)
с- ми_за-откриване_на_атаки(ids)с- ми_за-откриване_на_атаки(ids)
с- ми_за-откриване_на_атаки(ids)ssalieva
 
Algoritmos Genéticos
Algoritmos GenéticosAlgoritmos Genéticos
Algoritmos GenéticosESCOM
 
Lecture 29 genetic algorithm-example
Lecture 29 genetic algorithm-exampleLecture 29 genetic algorithm-example
Lecture 29 genetic algorithm-exampleHema Kashyap
 
Keylogger
KeyloggerKeylogger
Keyloggerfrank
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAparna Bhadran
 
genetic algorithm based music recommender system
genetic algorithm based music recommender systemgenetic algorithm based music recommender system
genetic algorithm based music recommender systemneha pevekar
 
Genetic Algorithm by Example
Genetic Algorithm by ExampleGenetic Algorithm by Example
Genetic Algorithm by ExampleNobal Niraula
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithmgarima931
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications Ahmed_hashmi
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 

En vedette (18)

Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Data Science - Part XIV - Genetic Algorithms
Data Science - Part XIV - Genetic AlgorithmsData Science - Part XIV - Genetic Algorithms
Data Science - Part XIV - Genetic Algorithms
 
Wireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security SystemWireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security System
 
с- ми_за-откриване_на_атаки(ids)
с- ми_за-откриване_на_атаки(ids)с- ми_за-откриване_на_атаки(ids)
с- ми_за-откриване_на_атаки(ids)
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
 
Keylogger
KeyloggerKeylogger
Keylogger
 
Algoritmos Genéticos
Algoritmos GenéticosAlgoritmos Genéticos
Algoritmos Genéticos
 
Lecture 29 genetic algorithm-example
Lecture 29 genetic algorithm-exampleLecture 29 genetic algorithm-example
Lecture 29 genetic algorithm-example
 
Keylogger
KeyloggerKeylogger
Keylogger
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
genetic algorithm based music recommender system
genetic algorithm based music recommender systemgenetic algorithm based music recommender system
genetic algorithm based music recommender system
 
What is keylogger
What is keyloggerWhat is keylogger
What is keylogger
 
Genetic Algorithm by Example
Genetic Algorithm by ExampleGenetic Algorithm by Example
Genetic Algorithm by Example
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 

Similaire à Network Intrusion Detection Using Genetic Algorithms

Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Disha Bedi
 
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...Priyanka Aash
 
Using Ansible Tower to implement security policies and telemetry streaming fo...
Using Ansible Tower to implement security policies and telemetry streaming fo...Using Ansible Tower to implement security policies and telemetry streaming fo...
Using Ansible Tower to implement security policies and telemetry streaming fo...Joel W. King
 
Micro profile and istio
Micro profile and istioMicro profile and istio
Micro profile and istioEmily Jiang
 
Distributed Deep Learning Using Java on the Client and in the Cloud
Distributed Deep Learning Using Java on the Client and in the CloudDistributed Deep Learning Using Java on the Client and in the Cloud
Distributed Deep Learning Using Java on the Client and in the CloudData Science Leuven
 
4 wireless pan, lan and man
4 wireless pan, lan and man4 wireless pan, lan and man
4 wireless pan, lan and manManigandan BE
 
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...Christian Esteve Rothenberg
 
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012Charith Perera
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java ProjectsVijay Karan
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSHASHANK WANKHADE
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docxhoney725342
 
Low Priced And Efficient Energy Replica Detection In WSN
Low Priced And Efficient Energy Replica Detection In WSNLow Priced And Efficient Energy Replica Detection In WSN
Low Priced And Efficient Energy Replica Detection In WSNIRJET Journal
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java ProjectsVijay Karan
 
SAST, CWE, SEI CERT and other smart words from the information security world
SAST, CWE, SEI CERT and other smart words from the information security worldSAST, CWE, SEI CERT and other smart words from the information security world
SAST, CWE, SEI CERT and other smart words from the information security worldAndrey Karpov
 
Network Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxNetwork Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxSubhrajyotiPayra
 
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561Vishwanath rakesh ece 561
Vishwanath rakesh ece 561RAKESH_CSU
 
It’s All In The Name - Deral Heiland
It’s All In The Name - Deral HeilandIt’s All In The Name - Deral Heiland
It’s All In The Name - Deral HeilandEC-Council
 

Similaire à Network Intrusion Detection Using Genetic Algorithms (20)

Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
 
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
 
Using Ansible Tower to implement security policies and telemetry streaming fo...
Using Ansible Tower to implement security policies and telemetry streaming fo...Using Ansible Tower to implement security policies and telemetry streaming fo...
Using Ansible Tower to implement security policies and telemetry streaming fo...
 
Micro profile and istio
Micro profile and istioMicro profile and istio
Micro profile and istio
 
Distributed Deep Learning Using Java on the Client and in the Cloud
Distributed Deep Learning Using Java on the Client and in the CloudDistributed Deep Learning Using Java on the Client and in the Cloud
Distributed Deep Learning Using Java on the Client and in the Cloud
 
4 wireless pan, lan and man
4 wireless pan, lan and man4 wireless pan, lan and man
4 wireless pan, lan and man
 
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
 
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java Projects
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
 
Low Priced And Efficient Energy Replica Detection In WSN
Low Priced And Efficient Energy Replica Detection In WSNLow Priced And Efficient Energy Replica Detection In WSN
Low Priced And Efficient Energy Replica Detection In WSN
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java Projects
 
WiPAt
WiPAtWiPAt
WiPAt
 
Generator of pseudorandom sequences
Generator of pseudorandom sequences Generator of pseudorandom sequences
Generator of pseudorandom sequences
 
ICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptxICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptx
 
SAST, CWE, SEI CERT and other smart words from the information security world
SAST, CWE, SEI CERT and other smart words from the information security worldSAST, CWE, SEI CERT and other smart words from the information security world
SAST, CWE, SEI CERT and other smart words from the information security world
 
Network Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxNetwork Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptx
 
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561Vishwanath rakesh ece 561
Vishwanath rakesh ece 561
 
It’s All In The Name - Deral Heiland
It’s All In The Name - Deral HeilandIt’s All In The Name - Deral Heiland
It’s All In The Name - Deral Heiland
 

Dernier

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Network Intrusion Detection Using Genetic Algorithms

  • 1. PROJECT SEMINARPROJECT SEMINAR OnOn ““Network Intrusion DetectionNetwork Intrusion Detection using Genetic Algorithmusing Genetic Algorithm”” Presented byPresented by Under the Guidance ofUnder the Guidance of CoordinatorsCoordinators Chakrapani D.SChakrapani D.S [ B.E, M.tech ][ B.E, M.tech ] Lecturer, Dept of CSELecturer, Dept of CSE ChetanChetan K. RK. R [ B.E, M.Tech ][ B.E, M.Tech ] Sr. Lecturer , Dept of CSESr. Lecturer , Dept of CSE Poornima K.MPoornima K.M [ B.E, M.Tech ][ B.E, M.Tech ] Asst. Professor, Dept of CSEAsst. Professor, Dept of CSE Jawaharlal Nehru National College of Engineering,Jawaharlal Nehru National College of Engineering, ShimogaShimoga HITESH KUMAR. P 4JN07CS027HITESH KUMAR. P 4JN07CS027 SAGAR. USAGAR. U 4JN07CS0704JN07CS070 SANDEEP TANTRY. K 4JN07CS072SANDEEP TANTRY. K 4JN07CS072 SHARATH KUMAR. K 4JN07CS078SHARATH KUMAR. K 4JN07CS078
  • 2. Contents 1. Introduction 1.1 Introduction to Intrusion Detection System(IDS). 1.2 Introduction to genetic algorithm. 2. Problem Specification 2.1 Major problems addressed. 2.2 Challenges faced. 2.3 Scope of the project. 3. Literature Survey 3.1 Features & Technology used. 3.2 Drawbacks & Solutions. 4. System Architecture 4.1 Workflow diagrams & Modules.
  • 3. Introduction to IntrusionIntroduction to Intrusion Detection SystemDetection System  Intrusion.Intrusion.  ExternalExternal  InternalInternal  Intrusion Detection System.Intrusion Detection System.  Misuse vs Anomaly.Misuse vs Anomaly.  Host-based vs Network-based.Host-based vs Network-based.
  • 4.  IDS - one piece of the whole Security puzzle.  Lots of people use Firewall and Router logs for Intrusion Detection .  Important Security architecture but does not solve all your problems .  Mostly signature based .  Example (Denial of Service [ DoS ] Attack).
  • 5. Introduction-Genetic Algorithm  Definition.  Background Theory.  A simple Genetic Algorithm. StartStart GenerateGenerate randomrandom populationpopulation EvaluationEvaluation FunctionFunction OptimizationOptimization Criteria met?Criteria met? BestBest IndividualsIndividuals ResultResult SelectionSelection CrossoverCrossoverMutationMutation yesyes nono GenerateGenerate a newa new PopulationPopulation
  • 6. Applications. Military Information security in some multinational agencies. Intrusion Prevention System. Significance. Network traffic analysis . Detection of various attacks.
  • 7. Major problems  Security infrastructure.  Threats originating from outside.  Support Issues (OS, Platform)  Evaluation Parameters.
  • 8. Challenges  Frequency vs Difficulty level.  Hacktivists or cyber terrorists  Deployment & Myths  Using IDS in fully switched networks  Interpreting all the data being presented  Encryption, VPN, Tunnels  Performance  Response team.
  • 9. Scope  Combining knowledge from different sensors into a Standard rule base.  Local Area Security.  Security purpose in main servers across the world.  Intelligence Intrusion Detection System(IIDS) is an ongoing Project in Mississippi University.
  • 10. Literature Survey • “The Integration of security sensors into the Intelligent Intrusion Detection System (IIDS) in a cluster environment” by Li, Wei – In this paper the author has described the some methods to detect Intrusion in Network.
  • 11. • “Network Intrusion Detection” by Stephen Northcutt, Judy Novak – In this book the author has described some concepts related to networks and concepts related to Intrusion Detection
  • 12. • “Principles of Information Security” - Michel E. Whitman and Herbert J. Mattord – In this paper the author has described about concepts in network security completely.
  • 13. • “Genetic Algorithms with Dynamic Niche Sharing for Multimodal Function Optimization.” by Miller, Brad. L. and Michael J. Shaw. – In this paper the author has described about the concepts of Genetic algorithm and its applications (usage).
  • 14. Applying Genetic Algorithm to IDS • Genetic algorithms can be used to evolve simple rules for network traffic. The rules stored in the rule base are usually in the following form if { condition } then { act } Eg. if {the connection has following information: source IP address 124.12.5.18; destination IP address:130.18.206.55; destination port number: 21; connection time: 10.1 seconds } then {stop the connection}
  • 15. Rule definition for connection and range of values of each field AttributeAttribute Range Eg. Value DescriptionsRange Eg. Value Descriptions 0.0.0.0 – 255.0.0.0.0 – 255. d1.0b.**.** A subnet withd1.0b.**.** A subnet with resperespe Source IPSource IP 255.255.255255.255.255 (209.11.??.??) -ctive range of IP(209.11.??.??) -ctive range of IP Destination IP 0.0.0.0 – 255.Destination IP 0.0.0.0 – 255. 82.12.b*.**82.12.b*.** A subnet with respA subnet with resp 255.255.255255.255.255 -ective range of IP-ective range of IP Source Port no 0 - 65535Source Port no 0 - 65535 4233542335 Source Port noSource Port no Dest Port no 0 - 65535 00080Dest Port no 0 - 65535 00080 HTTP ServiceHTTP Service Duration 0 - 99999999 00000482 ConnectionDuration 0 - 99999999 00000482 Connection DurationDuration StateState 1 – 121 – 12 1111 (Internal Use)(Internal Use) ProtocolProtocol 1 – 91 – 9 22 TCPTCP ProtocolProtocol Bytes sent 0 – 9999999999 0000007320Bytes sent 0 – 9999999999 0000007320 Originator sends reOriginator sends re
  • 16. Chromosome structure for example ( d, 1, 0, b, -1, -1, -1, -1, 8, 2, 1, 2, 1, 2, b, -1, -1,( d, 1, 0, b, -1, -1, -1, -1, 8, 2, 1, 2, 1, 2, b, -1, -1, -1, 4, 2, 3, 3, 5, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 4, 8, 2,-1, 4, 2, 3, 3, 5, 0, 0, 0, 8, 0, 0, 0, 0, 0, 0, 4, 8, 2, 1, 1, 2, 0, 0, 0, 0, 0, 0, 7, 3, 2, 0, 0, 0, 0, 0, 0, 3,1, 1, 2, 0, 0, 0, 0, 0, 0, 7, 3, 2, 0, 0, 0, 0, 0, 0, 3, 8, 9, 1, 1 )8, 9, 1, 1 )
  • 17. Drawbacks of other existing system  All the internal rules should be defined.  complex or loosely defined problems.  Monitoring systems.  Exact match for rules.  About 400 different IDS on the market-Only a few are scalable, and easy to maintain.
  • 18. System Architecture StartStart GenerateGenerate randomrandom populationpopulation EvaluationEvaluation FunctionFunction OptimizationOptimization Criteria met?Criteria met? BestBest IndividualsIndividuals ResultResult SelectionSelection CrossoverCrossoverMutationMutation yesyes nono GenerateGenerate a newa new PopulationPopulation
  • 19. Data setData set NetworkNetwork sniffersniffer GAGA Rule SetRule Set RuleRule BaseBase Rule Base ModuleRule Base Module
  • 20. Evaluation Function = Outcome – Suspicious level= Outcome – Suspicious level 5757 Outcome =Outcome = Matched * Weight(i)Matched * Weight(i) i=1i=1 Fitness = 1 - PenaltyFitness = 1 - Penalty Penalty = (Penalty = ( * ranking )* ranking ) 100100
  • 22. • For example, 209.103.51.134 and 101.1.25.193 209.103.25.193 and 101.1.51.134.
  • 23. 11 1 0 1 0 11 0 1 0 1 Before MutationBefore Mutation 1 0 0 0 0 11 0 0 0 0 1 After MutationAfter Mutation MutationMutation
  • 25.  Li, Wei. 2002. “The integration of security sensors intoLi, Wei. 2002. “The integration of security sensors into the Intelligent Intrusion Detection System (IIDS) in athe Intelligent Intrusion Detection System (IIDS) in a cluster environment.” Master’s Project Report. Departmentcluster environment.” Master’s Project Report. Department of Computer Science, Mississippi State University.of Computer Science, Mississippi State University.  Miller, Brad. L. and Michael J. Shaw. 1996. “GeneticMiller, Brad. L. and Michael J. Shaw. 1996. “Genetic Algorithms with Dynamic Niche Sharing for MultimodalAlgorithms with Dynamic Niche Sharing for Multimodal Function Optimization.”Function Optimization.” In Proceedings of IEEEIn Proceedings of IEEE International Conf. on Evolutionary Computation.International Conf. on Evolutionary Computation.  ““Network Intrusion Detection” by Stephen Northcutt,Network Intrusion Detection” by Stephen Northcutt, Judy Novak ( 3Judy Novak ( 3rdrd edition).edition).  ““Principles of Information SecurityPrinciples of Information Security” - Michel E. Whitman and” - Michel E. Whitman and Herbert J. Mattord, (2Herbert J. Mattord, (2ndnd Edition)Edition) REFERENCESREFERENCES