International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 07 | July 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2916 Intrusion Detection using IP Binding in Real Network Vishakha R. Deshmukh 1 , Dr. Sheetal. S. Dhande-Dandge 2 1 Student, Department of Computer Science and Engineering, SIPNA COET, Amravati, Maharashtra, India 2 Professor, Department of Computer Science and Engineering, SIPNA COET, Amravati, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - In the era of big data, with the increasing number of audit data features, human- centered smart intrusion detection system (IDS) performance is decreasing in training time and classification accuracy, and many SVM-based intrusion detection algorithms have been widely used to identify an intrusion quickly and accurately. This paper proposes the FWP-SVM-GA (feature selection, weight, and parameter optimization of support vector machine based on the genetic algorithm) algorithm based on the characteristics of the genetic algorithm (GA) and the support vector machine (SVM) algorithm. The algorithm first optimizes the crossover probability and mutation probability of GA according to the population evolution algebra and fitness value; then, it subsequently uses a feature selection method based on the genetic algorithm with an innovation in the fitness function that decreases the SVM error rate and increases the true positive rate. Finally, according to the optimal feature subset, the feature weights and parameters of SVM are simultaneously optimized. The simulation results show that the algorithm accelerates the algorithm convergence, increases the true positive rate, decreases the error rate, and shortens the classification time. Compared with other SVM-based intrusion detection algorithms, the detection rate is higher and the false positive and false negative rates are lower. Key Words: Genetic Algorithm, Support Vector Machine, SHA Algorithm, AES Algorithm, IPs, Nodes, Users. 1. INTRODUCTION In the last few years, with the rapid popularization of internet, network has become a very important and essential method of user’s accomplishing relative business. However, as the great advantage that the rapid development of network technology has brought to our social life, the network economy is facing a not optimistic present situation. With the development and popularization of information and network technologies, network information security is becoming more and more important. Compared with traditional network defense technology (such as firewalls), It is a common misunderstanding that firewalls can recognize and block intruders. A firewall is simply a fence around a network. A fence has neither the capability of detecting somebody trying to break in (such as digging a hole underneath or jumping over it), nor can differentiate somebody carry through the gate is allowed in. A firewall simply restricts access to the designated points in the network. Intrusion Detection System is configured to respond to predefined suspicious activities. An IDS does not replace firewalls. Firewalls are must in any corporate security foundations. Intrusion Detection Systems identify attacks against networks or a host that firewalls is unable to see. Having IDS to complement a firewall can provide an extra layer of protection to a system such as- Identify attacks that firewall legitimately allow through (such as HTTP attacks against web servers) Identify attempts such as port scan Notice inside hacking Provides additional checks for holes/ports opened through firewalls intentionally or unintentionally. Intrusion Detection is a set of techniques and methods that are used to detect suspicious activity both at the network and host level. Using Intrusion Detection, we can collect and use information from known types of attacks and find out if someone is trying to attack our network or particular hosts. The information helps us to harden our network security, as well as for legal purposes. 1.1 What is Intruder? An intruder is a person who attempts to gain unauthorized access to a system or network to damage that system or network. This person attempts to violet security by interfering with system availability, data integrity or data confidentiality. Intruder always trying to gain access to a system or network with his criminal intentions. Once he gains access to that system or a network he will corrupt or steal the complete data from the system or network and imbalance the environment of a network Types of Intruder: There are two types of intruders: Outside Intruder (Masquerader): Pretend to be someone one is not an individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account. Outside intruder