International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 07 | July 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2916
Intrusion Detection using IP Binding in Real Network
Vishakha R. Deshmukh
1
, Dr. Sheetal. S. Dhande-Dandge
2
1
Student, Department of Computer Science and Engineering, SIPNA COET, Amravati, Maharashtra, India
2
Professor, Department of Computer Science and Engineering, SIPNA COET, Amravati, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - In the era of big data, with the increasing number
of audit data features, human- centered smart intrusion
detection system (IDS) performance is decreasing in training
time and classification accuracy, and many SVM-based
intrusion detection algorithms have been widely used to
identify an intrusion quickly and accurately. This paper
proposes the FWP-SVM-GA (feature selection, weight, and
parameter optimization of support vector machine based on
the genetic algorithm) algorithm based on the characteristics
of the genetic algorithm (GA) and the support vector machine
(SVM) algorithm.
The algorithm first optimizes the crossover probability and
mutation probability of GA according to the population
evolution algebra and fitness value; then, it subsequently uses
a feature selection method based on the genetic algorithm
with an innovation in the fitness function that decreases the
SVM error rate and increases the true positive rate. Finally,
according to the optimal feature subset, the feature weights
and parameters of SVM are simultaneously optimized. The
simulation results show that the algorithm accelerates the
algorithm convergence, increases the true positive rate,
decreases the error rate, and shortens the classification time.
Compared with other SVM-based intrusion detection
algorithms, the detection rate is higher and the false positive
and false negative rates are lower.
Key Words: Genetic Algorithm, Support Vector Machine,
SHA Algorithm, AES Algorithm, IPs, Nodes, Users.
1. INTRODUCTION
In the last few years, with the rapid popularization of
internet, network has become a very important and essential
method of user’s accomplishing relative business. However,
as the great advantage that the rapid development of
network technology has brought to our social life, the
network economy is facing a not optimistic present situation.
With the development and popularization of information and
network technologies, network information security is
becoming more and more important. Compared with
traditional network defense technology (such as firewalls), It
is a common misunderstanding that firewalls can recognize
and block intruders. A firewall is simply a fence around a
network. A fence has neither the capability of detecting
somebody trying to break in (such as digging a hole
underneath or jumping over it), nor can differentiate
somebody carry through the gate is allowed in. A firewall
simply restricts access to the designated points in the
network.
Intrusion Detection System is configured to respond to
predefined suspicious activities. An IDS does not replace
firewalls. Firewalls are must in any corporate security
foundations. Intrusion Detection Systems identify attacks
against networks or a host that firewalls is unable to see.
Having IDS to complement a firewall can provide an extra
layer of protection to a system such as-
Identify attacks that firewall legitimately allow
through (such as HTTP attacks against web
servers)
Identify attempts such as port scan
Notice inside hacking
Provides additional checks for holes/ports opened
through firewalls intentionally or unintentionally. Intrusion
Detection is a set of techniques and methods that are used to
detect suspicious activity both at the network and host level.
Using Intrusion Detection, we can collect and use
information from known types of attacks and find out if
someone is trying to attack our network or particular hosts.
The information helps us to harden our network security, as
well as for legal purposes.
1.1 What is Intruder?
An intruder is a person who attempts to gain
unauthorized access to a system or network to damage that
system or network. This person attempts to violet security by
interfering with system availability, data integrity or data
confidentiality.
Intruder always trying to gain access to a system or
network with his criminal intentions. Once he gains access to
that system or a network he will corrupt or steal the
complete data from the system or network and imbalance the
environment of a network
Types of Intruder:
There are two types of intruders:
Outside Intruder (Masquerader): Pretend to be
someone one is not an individual who is not authorized to use
the computer and who penetrates a system’s access controls
to exploit a legitimate user’s account. Outside intruder