Intrusion Detection Using Soft Computing Techniques Koushal Kumar Assistant Professor Department of Computer applications Sikh National College Qadian (GSP) (kaushal_kumar302@yahoo.com) Simranjit Singh Assistant Professor Department of Computer Science Guru Nanak Dev University (singhs_simran@yahoo.co.in) Abstract As the popularity and usage of Internet increases all over the world, security issues have also become very essential that have to be considered. In literature, different techniques from various disciplines have been utilized to develop efficient security methods but those techniques always have some shortcomings. In this chapter the author discuss soft computing techniques that have been applied in Intrusion Detection System (IDS). The scope of this chapter will encompass core techniques of soft computing including artificial neural networks, Fuzzy Logic Genetic algorithms and hybridization of these approaches. In this chapter the research contribution of each of above mentioned techniques will be systematically summarized and compared that will allows us to clearly define existing research challenges, and to highlight promising new research directions. The findings of this chapter should provide useful insights into the current IDS literature and be a good source for anyone who is interested in the application of soft computing approaches to IDSs. Keywords: Artificial Neural Network (ANN), Genetic Algorithm (GA), Fuzzy Logic (FL), Network Security, Back Propagation Network (BPN) Introduction: The Internet continuously growing exponentially with its usage in personal government and business applications which ultimately benefits to end users. Securing the digital assets (information) is a major concern in the present digital information era. Security of our computer systems (Personnel computer) and the networks (wired and wireless) to which our computer is connected becoming a significant topic of concern. Internet was originally designed by keeping functionality but not security in mind [1]. The Internet connects hundreds of millions of computers across the world and each computer running on heterogeneous hardware and software platforms for the purpose of resource sharing. However this interconnectivity among computers also enables malicious users to misuse resources and mount Internet attacks [2]. Security vulnerabilities if left unnoticed can destroy your whole system or network. Vulnerabilities are specific flaws in the hardware or software implementation of your networks or your application that may allow attackers to expose, alter, and change the sensitive information. Vulnerability could be weakness in your technology, configuration of network components or in the security policies you have applied. Without adequate and proper network security mechanisms many individuals, governments and businesses cannot survive for a long time period on the internet. Vulnerabilities can be exploited by hackers and results in devastating consequences and harmful attack [3]. Attack is any attempt to destroy expose, alter, disable, steal, or gain unauthorized access to or make unauthorized use of a resource. The dependency of more and more services on computer technology has resulted in the increase of computer related threats. As the number of users who are using internet is growing with time our networks is facing more and more electronic attacks. The increase in the number and severity of threats to our computer networks Koushal Kumar, International Journal of Computer Science & Communication Networks,Vol 6(3),153-169 IJCSCN | June-July 2016 Available online@www.ijcscn.com 153 ISSN:2249-5789