Full Paper View Go Back

Application of Self Adaptive Differential Evolution for Design of Modern Intrusion Detection System

Manas Kumar Yogi1 , Yamuna Mundru2

Section:Research Paper, Product Type: Journal-Paper
Vol.11 , Issue.5 , pp.39-47, Oct-2023


Online published on Oct 31, 2023


Copyright Ā© Manas Kumar Yogi, Yamuna Mundru . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Manas Kumar Yogi, Yamuna Mundru, ā€œApplication of Self Adaptive Differential Evolution for Design of Modern Intrusion Detection System,ā€ International Journal of Scientific Research in Computer Science and Engineering, Vol.11, Issue.5, pp.39-47, 2023.

MLA Style Citation: Manas Kumar Yogi, Yamuna Mundru "Application of Self Adaptive Differential Evolution for Design of Modern Intrusion Detection System." International Journal of Scientific Research in Computer Science and Engineering 11.5 (2023): 39-47.

APA Style Citation: Manas Kumar Yogi, Yamuna Mundru, (2023). Application of Self Adaptive Differential Evolution for Design of Modern Intrusion Detection System. International Journal of Scientific Research in Computer Science and Engineering, 11(5), 39-47.

BibTex Style Citation:
@article{Yogi_2023,
author = {Manas Kumar Yogi, Yamuna Mundru},
title = {Application of Self Adaptive Differential Evolution for Design of Modern Intrusion Detection System},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {10 2023},
volume = {11},
Issue = {5},
month = {10},
year = {2023},
issn = {2347-2693},
pages = {39-47},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3284},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3284
TI - Application of Self Adaptive Differential Evolution for Design of Modern Intrusion Detection System
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Manas Kumar Yogi, Yamuna Mundru
PY - 2023
DA - 2023/10/31
PB - IJCSE, Indore, INDIA
SP - 39-47
IS - 5
VL - 11
SN - 2347-2693
ER -

215 Views    139 Downloads    52 Downloads
  
  

Abstract :
Intrusion detection plays a pivotal role in safeguarding modern computer networks and systems from evolving cyber threats. To enhance the efficacy of intrusion detection systems (IDS) in detecting diverse and dynamic attack patterns, researchers have increasingly turned to optimization algorithms. Among these, the Differential Evolution (DE) algorithm has emerged as a promising candidate due to its ability to iteratively refine parameter configurations for complex systems. This paper explores the application of the Self Adaptive DE algorithm in intrusion detection. It discusses the conceptual framework of integrating DE with intrusion detection, highlighting the steps involved in parameter optimization and its implications for improving IDS performance. The paper further delves into key challenges, such as addressing adversarial attacks, real-time adaptation, and hybridization with other techniques, scalability, and the interpretability of results. By analyzing the potential future directions and research avenues in this domain, this paper provides a comprehensive overview of the role of Self Adaptive DE in enhancing the capabilities of intrusion detection systems and bolstering cyber defense mechanisms.

Key-Words / Index Term :
Differential Evolution, Security, Intrusion, Malicious, Mutation

References :
[1] Kirta, Toomas, and JĆ¼ri Kivimaab. "Optimizing it security costs by evolutionary algorithms.",Conference on Cyber Conflict Proceedings, 2010.
[2] Dass, Shuvalaxmi, and Akbar Siami Namin. "Evolutionary algorithms for vulnerability coverage., IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), IEEE, 2020.
[3] .Kivimaa, JĆ¼ri, and Toomas Kirt. "Evolutionary algorithms for optimal selection of security measures " ,European Conference on Cyber Warfare and Security. Academic Conferences International Limited. Vol.172, 2011.
[4] Subashini, P., et al. "Review on intelligent algorithms for cyber security." ,Handbook of Research on Machine and Deep Learning Applications for Cyber Security. IGI Global, pp.1-22, 2020.
[5] Abraham, Ajith, Crina Grosan, and Yuehui Chen. "Cyber security and the evolution in intrusion detection systems." Journal of Engineering and Technology, ISSN:0973-2632, 2005.
[6] Lysenko, Sergii, et al. "A cyberattacks detection technique based on evolutionary algorithms.", IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), IEEE, 2020.
[7] Dash,Tirtharaj. "A study on intrusion detection using neural networks trained with evolutionary algorithms." Soft Computing 21.10 ISSIN: 2687-2700, 2017.
[8] Hussein, Soodeh, and Behnam Mohammad Hasani Zade. "New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN " Computer Network,s 173: 107168, 2020.
[9] Ong,Yew-Soon. "Towards evolutionary multitasking: a new paradigm in evolutionary computation." Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3,.Springer Singapore, 2016.
[10] Shao, Yinan, et al. "Multi-objective neural evolutionary algorithm for combinatorial optimization problems." IEEE transactions on neural networks and learning systems, 2021.
[11] Soni, Sumit, and Bharat Bhushan,"Use of Machine Learning algorithms for designing efficient cyber security solutions." 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). Vol.1. IEEE, 2019.
[12] Tosh, Deepak, et al. "Establishing evolutionary game models for cyber security information exchange (cybex)." Journal of Computer and System Sciences ,pp.27-52, 2018.
[13] Yavanoglu, Ozlem, and Murat Aydos. "A review on cyber security datasets for machine learning algorithms." ,IEEE international conference on big data (big data). IEEE, 2017.
[14] Aburomman, Abdulla Amin, and Mamun Bin Ibne Reaz. "A novel weighted support vector machines multiclass classifier based on differential evolution for intrusion detection systems." Information Sciences, pp.225-246, 2017.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us atĀ  support@isroset.org or view contact page for more details.

Go to Navigation