Detection of non-content based attacks using GA with extended KDD features

Edward Guillén, Jhordany Rodriguez, Rafael Páez, Andrea Rodriguez

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

Detection attack tools have a very wide range of solutions, from the applications of rules obtained by experience to the use of machine learning techniques, including multiple bioinspired methods. In order to analyze the results of research methods for attack detection, the DARPA KDD data set have been widely used but their data are outdated for various kinds of attacks. A software called Spleen designed to get data from a tested network with the same structure of DARPA data set is introduced. The application is used to complete the data set with additional features according to an attack analysis. In order to show advantages of an extended data set, two genetic methods in the detection of non-content based attacks are tested.

Original languageEnglish
Title of host publicationInternational MultiConference of Engineers and Computer Scientists, IMECS 2012
EditorsJon Burgstone, S. I. Ao, Craig Douglas, W. S. Grundfest
PublisherNewswood Limited
Pages30-35
Number of pages6
ISBN (Electronic)9789881925169
ISBN (Print)9789881925114
StatePublished - 2012
Event2012 World Congress on Engineering and Computer Science, WCECS 2012 - San Francisco, United States
Duration: 24 Oct 201226 Oct 2012

Publication series

NameLecture Notes in Engineering and Computer Science
Volume1
ISSN (Print)2078-0958

Conference

Conference2012 World Congress on Engineering and Computer Science, WCECS 2012
Country/TerritoryUnited States
CitySan Francisco
Period24/10/1226/10/12

Keywords

  • Adaptative algorithm
  • Genetic algorithms
  • Information security
  • Intrusion detection
  • KDD
  • Machine learning TCPIP

Fingerprint

Dive into the research topics of 'Detection of non-content based attacks using GA with extended KDD features'. Together they form a unique fingerprint.

Cite this