5 research outputs found

    A Genetic Algorithm Based elucidation for improving Intrusion Detection through condensed feature set by KDD 99 data set

    Get PDF
    An Intrusion detection system's main aim is to identify the normal and intrusive activities. The objective of this paper is to incorporate Genetic algorithm with reduced feature set into the system to detect and classify intrusions from normal. The experiments and evaluations of the proposed method were done using KDD cup 99 data set. The Genetic algorithm is used to derive a set of rules from the reduced training data set, and the fitness function is employed to judge the quality of rules. Keywords: Genetic Algorithm, Detection Rate, Intrusion Detection System, Reduced Feature Set, KDD 99 data set

    Sensor networks security based on sensitive robots agents. A conceptual model

    Full text link
    Multi-agent systems are currently applied to solve complex problems. The security of networks is an eloquent example of a complex and difficult problem. A new model-concept Hybrid Sensitive Robot Metaheuristic for Intrusion Detection is introduced in the current paper. The proposed technique could be used with machine learning based intrusion detection techniques. The new model uses the reaction of virtual sensitive robots to different stigmergic variables in order to keep the tracks of the intruders when securing a sensor network.Comment: 5 page

    An Advanced Efficient Secured Blind Authentication and Verification Crypto Protocol

    No full text
    The main objective of this application is to provide biometric verification protocol for the financial server with template protection and validity of trustable server. Most biometric systems assume that the template in the system is secure due to human supervision or physical protection. Authentication over insecure public networks or with untrusted servers raises more concerns in privacy and security. The primary concern is related to the security of the plain biometric templates, which cannot be replaced once they are compromised. The main objective of this system is to provide secure and blind biometric authentication protocol to protect the biometric template data with high security and accuracy. The protocol is blind in the sense that it reveals only the identity, and no additional information about the user or the biometric to the authenticating server or vice-versa. As the protocol is based on asymmetric encryption of the biometric data, it captures the advantages of biometric authentication as well as the security of public key cryptography. The encryption also provides template protection, the ability to revoke enrolled templates, and alleviates the concern on privacy in widespread use of biometrics. The proposed approach makes the communication between the concern and its client in a trustable mod
    corecore