Open Access Open Access  Restricted Access Subscription or Fee Access

Network Monitoring Using Genetic Algorithm

Amit Savyanavar, Mayank Manish, Raunak Agarwal, Devanshu Gupta, Saral Jain


This is the era of cloud computing and it is very necessary to protect the network that enables it. There is a large growth in security concerns on the internet. It is necessary to predict attacks before they happen and on the very first attempt. Artificial Intelligence offers a lot in this regard. Network security can be greatly enhanced using Genetic Feedback Algorithm. This can be used as a framework to judge the consistency and integrity of incoming packets and thus greatly enhance the security of the network. It does so by keeping track on oncoming packets into the network and comparing them with themselves to generate results. This can be used to create an effective Intrusion Detection System.


Genetic Algorithm, Intrusion Detection System, Network Filter, Network Security.

Full Text:



Wei Li,” Using Genetic Algorithm for Network Intrusion Detection”, Department of Computer Science and Engineering, Mississippi State University,Mississippi State, MS 39762 Email:

B. Abdullah, I. Abd-alghafar,Gouda I. Salama and A. Abd-alhafez, “Performance Evaluation of a Genetic Algorithm Based Approach To Network Intrusion Detection System” .

Anil Kumar, M. K. Ghose, “Information Security using Genetic Algorithm and Chaos” Sikkim Manipal Institute of Technology, Sikkim (INDIA).

Zorana Banković, José M. Moya, Álvaro Araujo, Slobodan Bojanić and Octavio Nieto-Taladriz “A Genetic Algorithm-based Solution for Intrusion Detection” ETSI Telecomunicación, Universidad Politécnica de Madrid Ciudad Universitaria sn, 28040 Madrid, Spain.

Silvia TRIF, “Using Genetic Algorithms in Secured Business Intelligence Mobile Applications”, Academy of Economic Studies, Bucharest, Romania.

David Patrick, Peter Green and Trevor York,” A distributed genetic algorithm environment for unix workstation clusters”, Department of Electrical Engineering & Electronics, University of Manchester Institute of Science and Technology.

J Zhao, S McKenzie and A J Soper,” A genetic algorithm for the design of multipoint connections in a local access network”, University of Greenwich, UK.

L Tdieb and * M Schoenaue,” Optimization of direction finders by Genetic Algorithms”, *Ecole Polytechnique, France.

A. Chittur, “Model Generation for an Intrusion Detection System Using Genetic Algorithms”, http:// (accessed in January 2005)

W. Li, “A Genetic Algorithm Approach to Network Intrusion Detection”, SANS Institute, USA, 2004.

W. Lu and I. Traore, “Detecting New Forms of Network Intrusion Using Genetic Programming”, Computational Intelligence, vol. 20, pp. 3, Blackwell Publishing, Malden, pp. 475-494, 2004.

M. M. Pillai, J. H. P. Eloff and H. S. Venter, “An Approach to Implement a Network Intrusion Detection System using Genetic Algorithms”, Proceedings of SAICSIT, pp. 221-228, 2004.

S. M. Bridges and R. B. Vaughn, “Fuzzy Data Mining And Genetic Algorithms Applied To Intrusion Detection”, Proceedings of 12th Annual Canadian Information Technology Security Symposium, pp. 109-122, 2000.

J. Gomez and D. Dasgupta, “Evolving Fuzzy Classifiers for Intrusion Detection”, Proceedings of the IEEE, 2002.

M. Middlemiss and G. Dick, “Feature selection of intrusion detection data using a hybrid genetic algorithm/KNN approach”, Design and application of hybrid intelligent systems, IOS Press Amsterdam, pp. 519-527, 2003.

Graham, Robert. “FAQ: Network Intrusion Detection Systems.”, 2000.

Bridges, Susan, and Rayford B. Vaughn. “Intrusion Detection Via Fuzzy Data Mining.” In Proceedings of 12th Annual Canadian Information Technology Security Symposium, Ottawa, Canada, 2000.

SU Pu-Rui, LI De-Quan, FENG Deng-Guo, “A Host-Based Anomaly Intrusion Detection Model Based on Genetic Programming”, Journal of Software, 2003.

Crosbie, Mark, and Gene Spafford. “Applying Genetic Programming to Intrusion Detection”, Cambridge, Massachusetts, 1995.

Mark L. Stevens and Walter J. Weiss, “Policy-based Management for IP Networks”, Bell Labs Technical Journal, Network Management, Vol. 4 No. 4, October-December 1999.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.