A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection
|
|
|
- Elfreda Walker
- 10 years ago
- Views:
Transcription
1 A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi School of Computing Queen s University Kingston, Ontario, Canada K7L 3N6 {rhgong, mzulker, purang}@cs.queensu.ca Abstract With the rapid expansion of Internet in recent years, computer systems are facing increased number of security threats. Despite numerous technological innovations for information assurance, it is still very difficult to protect computer systems. Therefore, unwanted intrusions take place when the actual software systems are running. Different soft computing based approaches have been proposed to detect computer network attacks. This paper presents a genetic algorithm (GA) based approach to network intrusion detection, and the software implementation of the approach. The genetic algorithm is employed to derive a set of classification rules from network audit data, and the support-confidence framework is utilized as fitness function to judge the quality of each rule. The generated rules are then used to detect or classify network intrusions in a real-time environment. Unlike most existing GA-based approaches, because of the simple representation of rules and the effective fitness function, the proposed method is easier to implement while providing the flexibility to either generally detect network intrusions or precisely classify the types of attacks. Experimental results show the achievement of acceptable detection rates based on benchmark DARPA data sets on intrusions, while no other complementary techniques or relevant heuristics are applied. Keywords: Information assurance, misuse intrusion detection, genetic algorithms, support-confidence framework, software development. 1. Introduction The Internet and local area networks are expanding at an amazing rate in recent years. While we are benefiting from the convenience that the new technology has brought us, computer systems are exposed to increasing security threats that originate externally or internally. Different but complementary technologies have been developed and deployed to protect organizations computer systems against network attacks, for example, anti-virus software, firewall, message encryption, secured network protocols, password protection, and so on. Despite different protection mechanisms, it is nearly impossible to have a completely secured system. Therefore, intrusion detection is becoming an increasingly important technology that monitors network traffic and identifies network intrusions such as anomalous network behaviors, unauthorized network access, and malicious attacks to computer systems [15]. There are two general categories of intrusion detection systems (IDSs): misuse detection and anomaly detection [16]. Misuse detection systems detect intruders with known patterns, and anomaly detection systems identify deviations from normal network behaviors and alert for potential unknown attacks. Some IDSs integrate both misuse and anomaly detection and form hybrid detection systems. The IDSs can also be classified into two categories depending on where they look for intrusions. A host-based IDS monitors activities associated with a particular host, and a network-based IDS listens to network traffic. A number of soft computing based approaches have been proposed for detecting network intrusions [1, 2, 3, 4, 6, 10]. Soft computing refers to a group of techniques that exploit the tolerance for imprecision, uncertainty, partial truth, and approximation to achieve robustness and low solution cost. The principle constituents of soft computing are Fuzzy Logic (FL), Artificial Neural Networks (ANNs), Probabilistic Reasoning (PR), and Genetic Algorithms (GAs) [10]. When used for intrusion detection, soft computing techniques are often used in conjunction with rule-
2 based expert systems acquiring expert knowledge [1, 4, 5, 6], where the knowledge is represented as a set of if-then rules. Despite different soft computing based approaches having been proposed, the possibilities of using the techniques for intrusion detection are still under-utilized. In this paper, we present a GA-based approach to network misuse detection. GA is chosen because of some of its nice properties, e.g., robust to noise, no gradient information is required to find a global optimal or sub-optimal solution, self-learning capabilities, etc. Using GAs for network intrusion detection has proven to be a cost-effective approach [1, 2, 3, 7, 8, 9, 11]. In this work, we implement a software based on the presented approach. The software is experimented using DARPA data sets on intrusions, which has become the de facto standard for testing intrusion detection systems. The experimental results show that our approach is effective, and it has the flexibility to either generally detect network intrusions or precisely classify the types of misuses. This is due to the use of both categorical and quantitative features of network audit data for deriving the classification rules, and the use of the supportconfidence framework as the GA fitness function. Paper Organization. Thus far, we have discussed the motivation and a brief overview of the presented work. The rest of the paper is organized as follows. Section 2 gives an overview of the genetic algorithm employed in this work. Section 3 reviews the work relevant to this research, while some of the more closely related work are discussed in the relevant parts of this paper. Sections 4 and 5 describe in detail the proposed method and its software implementation. Section 6 presents the experimental results, and Section 7 concludes the paper with some future recommendations. 2. Genetic Algorithms Genetic algorithms [3, 12] employ metaphor from biology and genetics to iteratively evolve a population of initial individuals to a population of high quality individuals, where each individual represents a solution of the problem to be solved and is composed of a fixed number of genes. The number of possible values of each gene is called the cardinality of the gene. Figure 1 illustrates the operation of a general genetic algorithm. The operation starts from an initial population of randomly generated individuals. Then the population is evolved for a number of generations and the qualities of the individuals are gradually improved. During each generation, three basic genetic operators are sequentially applied to each individual with certain probabilities, i.e., selection, crossover, and mutation. First, a number of best-fit individuals are selected based on a user-defined fitness function. The remaining individuals are discarded. Next, a number of individuals are selected and paired with each other. Each individual pair produces one offspring by partially exchanging their genes around one or more randomly selected crossing points. At the end, a certain number of individuals are selected and the mutation operations are applied, i.e., a randomly selected gene of an individual abruptly changes its value. One extension of genetic algorithms, namely Genetic Programming (GP) [3, 8], is also commonly used. It differs from GAs in the way of encoding individuals. GAs use fixed length vectors to represent individuals. In contrast, GP encodes each individual with a parse tree, where leaf nodes are genes and nonleaf nodes are primitive functions (e.g., AND, OR, etc.). GP has the flexibility to represent very complex individuals. In the context of rule based expert systems, GAs are often used to efficiently derive simple rules, and GP is used when more complex or accurate rules are required. initial population initialization selection new population yes quit? no crossover mutation end old population Figure 1. The operation of a generic GA. When a GA is used for problem-solving, three factors will have impact on the effectiveness of the algorithm, they are: 1) the selection of fitness function; 2) the representation of individuals; and 3) the values of the GA parameters. The determination of these factors often depends on applications. In our implementation for network intrusion detection, the
3 support-confidence framework was used as fitness function, a simple GA (rather than GP) was employed to represent and derive rules, and appropriate GA parameters, including selection rate, crossing over style, mutation rate, etc, were chosen based on a large number of experiments. 3. Related Work This section briefly summarizes some of the applications of soft computing techniques for intrusion detection. However, a number of GA based IDSs are discussed in the later part of the paper in order to compare and contrast those work with our work. GAs and GP have been used for network intrusion detection in different ways. Some approaches directly use GAs to derive the classification rules [2, 7, 8, 11], while some others use different AI methods for acquisition of rules, where GAs are used to select appropriate features or to determine the optimal parameters of some functions [1, 5, 9]. The early effort of using GAs for intrusion detection can be dated back to 1995, when Crosbie et al. [3] applied the multiple agent technology and GP to detect network anomalies. Each agent monitors one parameter of the network audit data and GP is used to find the set of agents that collectively determine anomalous network behaviors. This method has the advantage of using many small autonomous agents, but the communication among them is still a problem. Also the training process can be time-consuming if the agents are not appropriately initialized. Bridges et al. [1] develop a method that integrates fuzzy data mining techniques and genetic algorithms to detect both network misuses and anomalies. In most of the existing GA based IDSs, the quantitative features of network audit data are either ignored or simply treated, though such features are often involved in intrusion detection. This is because of the large cardinalities of quantitative features. The authors propose a way to include quantitative features by introducing fuzzy numerical functions. Their preliminary experiments show that the inclusion of quantitative features and the fuzzy functions significantly improved the accuracy of the generated rules. In this approach, a GA is used to find the optimal parameters of the fuzzy functions as well as to select the most relevant network features. Lu et al. [8] present an approach that uses GP to directly derive a set of classification rules from historical network data. The approach employs the support-confidence framework as the fitness function and is able to generally detect or precisely classify network intrusions. However, the use of GP makes implementation more difficult and more data or time are required to train the system. Li [7] propose a GA-based method to detect anomalous network behaviors. Both quantitative and categorical features of network data are included when deriving classification rules using GA. The inclusion of quantitative features may lead to increased detection rates. However, no experimental results are available yet. Xiao et al. [17] present an approach that uses information theory and GA to detect abnormal network behaviors. Based on the mutual information between network features and the types of network intrusions, a small number of network features are closely identified with network attacks. Then a linear structure rule is derived using the selected features and a GA. The use of mutual information reduces the complexity of GA, and the single resulting linear rule makes intrusion detection efficient in real-time environment. However, the approach considers only discrete features. 4. A GA-Based IDS The proposed GA-based intrusion detection approach contains two modules where each works in a different stage. In the training stage, a set of classification rules are generated from network audit data using the GA in an offline environment. In the intrusion detection stage, the generated rules are used to classify incoming network connections in the realtime environment. Once the rules are generated, the intrusion detection is simple and efficient. In the following sections, we focus our discussions on deriving the set of rules using GA Data Representation Several network features have higher possibilities to be involved in network intrusions [7, 9]. In our approach, seven of those features are selected from the network audit data to compose a classification rule. Table 1 shows the features and their formats. The feature names are given in the first column, while the second and third columns indicate how each of the network features is encoded in a chromosome. The second column represents the feature format and the third column shows the number of genes used for the corresponding feature. Note that different genes can be represented in different data types such as byte, integer, and float.
4 This is necessary because of different formats and data ranges for different features. For example, the feature Duration has three components (hours, minutes, and seconds), each of which is represented by one gene of type byte. Similarly, each of the features Protocol, Source port, Destination port and Attack name is encoded using one gene of type integer, and each of the features Source IP and Destination IP has four components (a, b, c, and d), each of which is represented by one gene of type byte. Table 1. Selected network features. Feature Name Format Number of Genes Duration h:m:s 3 Protocol Int 1 Source_port Int 1 Destination_port Int 1 Source_IP a.b.c.d 4 Destination_IP a.b.c.d 4 Attack_name Int 1 Each rule is an if-then clause, which contains a condition and an outcome. The first six features in Table 1 are connected using the logical AND operations and compose the condition part of a rule. The feature Attack name is used in the outcome part, which indicates the classification of a network record (at training stage) or connection (at intrusion detection stage) when the condition part of a rule is matched. The following shows a rule example that classifies a network connection as the denial-of-service attack neptune. if (duration= 0:0:1 and protocol= finger and source_port=18982 and destination_port=79 and source_ip= and destination_ip= ) then (attack_name= neptune ) The above rule expresses that if a network packet is originated from IP address and port 18982, and sent to IP address and port 79 using the protocol finger, and the connection duration is 1 second, then most likely it is a network attack of type neptune that may eventually cause the destination host out of service. Each rule is encoded as a chromosome using a fixed length vector, where each network feature is encoded using one or more genes of different types (see the second and third column of Table 1). In the above example, the encoded form of the rule would look like as follows: {0, 0, 1, 2, 18982, 79, 9, 9, 9, 9, 172, 16, 112, 50, 1} To make the rules more general, wildcards are allowed in several network features. In case of a wildcard, the corresponding gene is encoded as -1. For example, if the above rule was generalized to be applicable to all packets originated from network 9.9.*.*, then the rule would be encoded as: {0, 0, 1, 2, 18982, 79, 9, 9, -1, -1, 172, 16, 112, 50, 1} 4.2. Fitness Function To determine the fitness of a rule, the supportconfidence framework [8] is used. If a rule is represented as if A then B, then the fitness of the rule is determined using following equations: support = A and B / N confidence = A and B / A fitness = w1 * support + w2 * confidence Here, N is the total number of network connections in the audit data, A stands for the number of network connections matching the condition A, and A and B is the number of network connections that matches the rule if A then B. The weights w1 and w2 are used to control the balance between the two terms and have the default values of w1=0.2 and w2=0.8. One of the nice properties of using this fitness function is that, by changing the weights w1 and w2, the approach can be used for either simply identifying network intrusions or precisely classifying the types of intrusions. In the former case, w1 is set to 1 and w2 is set to 0. On the other hand, w1 = 0 and w2 = 1 for the latter case. Unlike other fitness functions used in the GA, the selection of w1 and w2 in this framework is not crucial to the performance of the approach Detection Algorithm Overview Listing 1 shows the major steps of the employed detection algorithm as well as the training process. It first generates the initial population, sets the defaults parameters, and loads the network audit data. Then the initial population is evolved for a number of generations. In each generation, the qualities of the rules are firstly calculated, then a number of best-fit rules are selected, and finally the GA operators are applied to the selected rules. The training process starts by randomly generating an initial population of rules (line 1). The weights and fitness threshold values are initialized in line 2. Line 3
5 calculates the total number of records in the audit data. Lines 4-18 calculate the fitness of each rule and select the best-fit rules into new population. Lines apply the crossover and mutation operators to each rule in the new population. Finally, line 23 checks and decides whether to terminate the training process or to enter the next generation to continue the evolution process. Algorithm : Rule set generation using genetic algorithm. Input : Network audit data, number of generations, and population size. Output : A set of classification rules. 1. Initialize the population 2. W1 = 0.2, W2 = 0.8, T = N = total number of records in the training set 4. For each chromosome in the population 5. A = 0, AB = 0 6. For each record in the training set 7. If the record matches the chromosome 8. AB = AB End if 10. If the record matches only the condition part 11. A = A End if 13. End for 14. Fitness = W1 * AB / N + W2 * AB / A 15. If Fitness > T 16. Select the chromosome into new population 17. End if 18. End for 19. For each chromosome in the new population 20. Apply crossover operator to the chromosome 21. Apply mutation operator to the chromosome 22. End for 23. If number of generations is not reached, goto line 4 Listing 1. Major steps of the detection algorithm. A similar technique of generating rules using a GA is used in Li s approach [7]. However, the approach proposed in this study differs with Li s method in two aspects: 1) the definition of fitness function; and 2) the representation of rules. First, Li s method uses a simple form of weighted sum as fitness function, in which weights are used to indicate the significance of each network feature. The weight values are crucial to the final detection performance. For practical usage, additional techniques, for example artificial neural networks, are required to accurately determine those values. Second, Li s approach encodes only the condition parts of the rules so the method is only suitable for detecting network anomalies. In contrast, our approach uses the support-confidence framework as fitness function and their values can be directly computed from historical data. Moreover, both condition and outcome of a rule are included in encoding in our approach. This has led the benefit of precisely detecting the types of network intrusions. When comparing to Lu s method [8], the same fitness function is used in both methods, however, our approach uses GA rather than GP to derive the classification rules. GP has the advantage of representing complex rules, but often more training data and longer training period are required. 5. IDS Implementation The proposed method is implemented using the Java language, and it is built on top of a third party software package ECJ [14]. ECJ is a comprehensive GA/GP Java toolkit developed and maintained by the ECLab of George Manson University. The package provides a rich set of GA foundation classes. When using ECJ to solve user problems, one of two ways can be used: using the full power of ECJ or only using the ECJ foundation classes. In the former case, minimal programming is required and configuration files are heavily used. In the latter case, more programming effort is involved but it allows more flexibilities and better user customizations. We adopted the second approach, mainly because the genes in our approach have different data types. The implementation contains two systems: an offline training system for deriving rules from historical data, and an online detection system that uses the generated rules to classify incoming network connections in real-time environment. Figure 2 shows the high-level class diagram of the training system. Four types of classes are present in the diagram: A main class (Main) that integrates all components and records the generated rules. A class (DarpaReader)that interfaces with DARPA data. This class reads and preprocesses the DARPA data. Classes that interface with ECJ include Initializer, Individual, Evaluator, Fitness, and Breeder. These classes are extended from the abstract counterparts of ECJ. The classes below the thick horizontal line are base classes from the ECJ package [14]. An "ec" prefix is used in each of the class names to indicate that.
6 When the training process starts, the Initializer first initializes the population with a number of randomly generated individuals. Then the GA is executed for a number of generations, each generation contains following two steps: 1) The classes Evaluator and Fitness are used to select a set of best-fit individuals from the population; and 2) The class Breeder applies other genetic operators, i.e. crossover and mutation, to each individual with a certain probability. Figure 2. High-level class diagram of the training system. 6. Experimental Results 6.1. Training and Testing Data The DARPA data from MIT Lincoln Laboratory [13] is broadly used to evaluate IDSs. In this study, two subsets were extracted from the 1998 DARPA data and used as the training and testing datasets. Each record of the datasets consists of 9 network features and 1 manually assigned record type. Six network features were used in the GA [7, 9], which are connection duration, protocol, source port, destination port, source IP address, and destination IP address. The record type indicates whether a record is a normal network connection or a particular network intrusion. Table 2 shows the distributions of record types in training and testing datasets. The first row shows the numbers of normal network packets, while the second and third rows give the distributions of two network attacks. As shown in Table 2, most network packets in the selected datasets are normal, and two kinds of network attacks are present: Portsweep and Pod. Portsweep is a kind of attack that sweeps through many ports to determine which services are supported on a single host. Pod is a denial of service attack that keeps pinging a host until the service is not available. Table 2. The distributions of record types. Record Type Training Set Testing Set Normal Portsweep Pod Total Experiments Two experiments have been conducted. In the first experiment, the system was trained with the training dataset, and the default fitness function and the GA parameters were used, i.e., w1=0.2, w2=0.8, 5000 generations, 500 initial rules in the population, crossover rate of 0.5, two-point crossover, and mutation rate of When the training process was finished, the top 20 best quality rules were taken as the
7 final classification rules. The rules were then used to classify the training data and the testing data respectively. The results are presented in Table 3. Table 3. Results (detection rates) of Experiment 1. Record Type Training Set Testing Set Normal 97.7% 94.2% Portsweep 91.8% 67.4% Pod 94.3% 78% The experimental results show that the proposed method yielded good detection rates when using the generated rules to classify the training data itself (the second column in the table). That is what we expected. The detection rates could be higher if the fitness function and the GA parameters were chosen more appropriately. When the resulting rules were used to classify the testing dataset, the detection rates of network attacks were decreased by around 20% (the third column in the table). The results have indicated that the generated rules were biased to the training data. This is a typical over-fitting problem inherent in major learning techniques, and this problem may be solved in the following two ways: 1) have less number of generations when training the system; or 2) use less number of best-fit rules when classifying new network data. In either approach, an appropriate number (i.e., number of generations or number of best-fit rules) has to be found. This is often done by trial and error. In the second experiment, the training data was employed to train the system, and the default GA parameters were used. The top 20 best-fit final rules were used to classify the training data. The experiment investigated how the two weights of the fitness function can be used to steer the system to simply detect general network intrusions or to precisely classify the types of intrusions. The experiment was repeated for two kinds of weight settings: 1) w1=0, w2=1; and 2) w1=1, w2=0. Table 4 shows the experimental results. Table 4. Results (detection rates) of Experiment 2. Record Type w1=0, w2=1 w1=1, w2=0 Normal 97.9% 98.0% Portsweep 94.9% 35.4% Pod 96.1% 25.6% Anomaly 95.7% 96.3% An additional row (the last row) has been added to Table 4, which shows the percentages of network intrusions being correctly detected, without considering their attack types. When an intrusion of a specific type (Portsweep or Pod) is detected, it is also classified as an anomaly. As indicated in the table, when w2 was set to 1, the detection rates of network attacks Portsweep and Pod were fairly high (second column). On the other hand, when w1 was set to 1 and w2 was set to 0, the detection rates for particular attacks were poor, but the total detection rate of network intrusions remained high (third column). 7. Conclusions and Recommendations In this paper, a method of applying genetic algorithms for network intrusion detection is presented. A software is implemented for the presented method, and its architecture and operations are described in detail using high level class diagram and pseudo-code. A number of experiments have been carried out using a benchmark data set in order to show the efficacy of the developed software. One of the major advantages of this technique is due to the fact that in the real world, the types of intrusions change and become complicated very rapidly. The proposed detection system can upload and update new rules to the systems as the new intrusions become known. Therefore, it is cost effective and adaptive. A GA is used to derive a set of classification rules from network audit data. Seven network features including both categorical and quantitative data fields were used when encoding and deriving the rules. A simple but efficient and flexible fitness function, i.e. the support-confidence framework, is used to select the appropriate rules. Depending on the selection of fitness function weight values, the generated rules can be used to either generally detect network intrusions or precisely classify the types of intrusions. The method has been implemented using Java and the third party package ECJ. The implementation was tested using selected subsets of the 1998 DARPA data. Experimental results showed that the proposed method worked effectively for the selected datasets and has the flexibility to be used in different ways to meet users special requirements. However, some limitations of the method are also observed. First, the generated rules were biased to the training dataset. This issue may be resolved by carefully selecting either the number of generations in the training phase or the number of top best-fit rules in the intrusion detection phase. The problem of low extrapolation power of the presented technique to a new dataset is primarily due to some inherent shortcomings associated with the most soft computing
8 techniques, and this paper is mainly an initial attempt towards overcoming those various shortcomings in the context of network intrusion detection. Nevertheless, the deployment of a number of complimentary techniques and some potential heuristics are being investigated to resolve this problem. Second, while the support-confidence framework is simple to implement and provides improved accuracy to final rules, it requires the whole training data to be loaded into memory before any computation. For large training datasets, it is neither efficient nor feasible. The use of some sorts of cache technologies may solve the problem. 7. References [1] S. M. Bridges and R. B. Vaughn, Fuzzy Data Mining And Genetic Algorithms Applied To Intrusion Detection, Proceedings of 12 th Annual Canadian Information Technology Security Symposium, pp , [2] A. Chittur, Model Generation for an Intrusion Detection System Using Genetic Algorithms, www1.cs.columbia.edu/ids/publications/gaids-thesis 01.pdf (accessed in January 2005). [3] M. Crosbie and E. Spafford, Applying Genetic Programming to Intrusion Detection, Proceedings of the AAAI Fall Symposium, 1995 [4] D. Dasgupta and F. A. Gonzalez, An Intelligent Decision Support System for Intrusion Detection and Response, MMM-ACNS, Lecture Notes in Computer Science, vol. 2052, pp. 1-14, [5] J. Gomez and D. Dasgupta, Evolving Fuzzy Classifiers for Intrusion Detection, Proceedings of the IEEE, [6] G. Helmer, J. Wong, V. Honavar and L. Miller, Automated discovery of concise predictive rules for intrusion detection, The Journal of Systems and Software, issue 60, pp , [7] W. Li, A Genetic Algorithm Approach to Network Intrusion Detection, SANS Institute, USA, [8] W. Lu and I. Traore, Detecting New Forms of Network Intrusion Using Genetic Programming, Computational Intelligence, vol. 20, pp. 3, Blackwell Publishing, Malden, pp , [9] M. Middlemiss and G. Dick, Feature selection of intrusion detection data using a hybrid genetic algorithm/knn approach, Design and application of hybrid intelligent systems, IOS Press Amsterdam, pp , [10] M. Moradi and M. Zulkernine, "A Neural Network Based System for Intrusion Detection and Classification of Attacks", Proceedings of the 2004 IEEE International Conference on Advances in Intelligent Systems - Theory and Applications, Luxembourg, November [11] M. M. Pillai, J. H. P. Eloff and H. S. Venter, An Approach to Implement a Network Intrusion Detection System using Genetic Algorithms, Proceedings of SAICSIT, pp , [12] H. Pohlheim, Genetic and Evolutionary Algorithms: Principles, Methods and Algorithms, (accessed in January 2005). [13] MIT Lincoln Laboratory, DARPA datasets, MIT, USA, (accessed in November 2004). [14] ECLab: evolutionary Computation laboratory, A Java-based Evolutionary Computation (ECJ) and Genetic Programming Research System, George Mason University, Fairfax, VA, USA, (accessed in November 2004). [15] A. Adetoye, A. Choi, M. Md. Arshad, and O. Soretire, Network Intrusion Detection & Response System, Group Report, September 2003, /2003/2003-hailes-b.pdf (accessed in January 2005). [16] B. Mukherjee, L. T. Heberlein, and K. N. Levitt, Network intrusion detection, IEEE Network, 8(3): 26-41, May/June [17] T. Xiao, G. Qu, S. Hariri, and M. Yousif, An Efficient Network Intrusion Detection Method Based on Information Theory and Genetic Algorithm, Proceedings of the 24 th IEEE International Performance Computing and Communications Conference (IPCCC 05), Phoenix, AZ, USA
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
Applying Genetic Algorithm to Intrusion Detection System
Applying Genetic Algorithm to Intrusion Detection System Vrishali Yewale 1, Vimla Jethani 2, Tushar Ghorpade 3 1 Computer Science Department, Mumbai University, RAIT College of Engineering, Nerul, Navi
A Neural Network Based System for Intrusion Detection and Classification of Attacks
A Neural Network Based System for Intrusion Detection and Classification of Attacks Mehdi MORADI and Mohammad ZULKERNINE Abstract-- With the rapid expansion of computer networks during the past decade,
Using Genetic Algorithm for Network Intrusion Detection
Using Genetic Algorithm for Network Intrusion Detection Wei Li Department of Computer Science and Engineering Mississippi State University, Mississippi State, MS 39762 Email: [email protected] Abstract
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
USING GENETIC ALGORITHM IN NETWORK SECURITY
USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:
Intrusion Detection Systems using Genetic Algorithms
King Saud University Computer Science Collage CSC590_Selected Topic A Literature Review on Intrusion Detection Systems using Genetic Algorithms Phase # 5 By: Lamees Alhazzaa ID: 426221091 Proposed to:
Network Based Intrusion Detection System using Genetic Algorithm: A Study
Network Based Intrusion Detection System using Genetic Algorithm: A Study 1 Purushottam Patil, 2 Dr. Yogesh Sharma and 3 Dr. Manali Kshirsagar 1 Research Scholar (Computer Science & Engineering), Faculty
An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications
International Journal of Computer Science and Telecommunications [Volume 5, Issue 2, February 2014] 20 An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
D A T A M I N I N G C L A S S I F I C A T I O N
D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.
Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic
Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic Mostaque Md. Morshedur Hassan Assistant Professor, Department of Computer Science and IT, Lalit Chandra Bharali College, Guwahati,
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
Improving Hypervisor-Based Intrusion Detection in IaaS Cloud for Securing Virtual Machines
Improving Hypervisor-Based Intrusion Detection in IaaS Cloud for Securing Virtual Machines 1 Shabnam Kazemi, 2 Vahe Aghazarian, 3 Alireza Hedayati 1 Department of Computer, Kish International Branch, Islamic
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
Computational intelligence in intrusion detection systems
Computational intelligence in intrusion detection systems --- An introduction to an introduction Rick Chang @ TEIL Reference The use of computational intelligence in intrusion detection systems : A review
How To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
A Biologically Inspired Approach to Network Vulnerability Identification
A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced
CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC
ABSTRACT CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC Mostaque Md. Morshedur Hassan LCB College, Maligaon, Guwahati, Assam, India. [email protected] Nowadays Intrusion
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Programming Risk Assessment Models for Online Security Evaluation Systems
Programming Risk Assessment Models for Online Security Evaluation Systems Ajith Abraham 1, Crina Grosan 12, Vaclav Snasel 13 1 Machine Intelligence Research Labs, MIR Labs, http://www.mirlabs.org 2 Babes-Bolyai
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES Vijayalakshmi Mahanra Rao 1, Yashwant Prasad Singh 2 Multimedia University, Cyberjaya, MALAYSIA 1 [email protected]
An Artificial Immune Model for Network Intrusion Detection
An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,
Effect of Using Neural Networks in GA-Based School Timetabling
Effect of Using Neural Networks in GA-Based School Timetabling JANIS ZUTERS Department of Computer Science University of Latvia Raina bulv. 19, Riga, LV-1050 LATVIA [email protected] Abstract: - The school
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL Prof. Santosh T. Waghmode 1, Prof. Vinod S. Wadne 2 Department of Computer Engineering, 1, 2 JSPM s Imperial College of Engineering
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
Performance Evaluation of Intrusion Detection Systems using ANN
Performance Evaluation of Intrusion Detection Systems using ANN Khaled Ahmed Abood Omer 1, Fadwa Abdulbari Awn 2 1 Computer Science and Engineering Department, Faculty of Engineering, University of Aden,
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
DETECTING NEW FORMS OF NETWORK INTRUSION USING GENETIC PROGRAMMING
Computational Intelligence, Volume 20, Number 3, 2004 DETECTING NEW FORMS OF NETWORK INTRUSION USING GENETIC PROGRAMMING WEI LU AND ISSA TRAORE Department of Electrical and Computer Engineering, University
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila
Data Mining For Intrusion Detection Systems Monique Wooten Professor Robila December 15, 2008 Wooten 2 ABSTRACT The paper discusses the use of data mining techniques applied to intrusion detection systems.
Using Artificial Intelligence in Intrusion Detection Systems
Using Artificial Intelligence in Intrusion Detection Systems Matti Manninen Helsinki University of Technology [email protected] Abstract Artificial Intelligence could make the use of Intrusion Detection
Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs
Intrusion Detection Systems Oussama El-Rawas History and Concepts of IDSs Overview A brief description about the history of Intrusion Detection Systems An introduction to Intrusion Detection Systems including:
Preprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques
www.ijcsi.org 387 Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques Utkarsh Dixit 1, Shivali Gupta 2 and Om Pal 3 1 School of Computer Science, Centre
Practical Applications of Evolutionary Computation to Financial Engineering
Hitoshi Iba and Claus C. Aranha Practical Applications of Evolutionary Computation to Financial Engineering Robust Techniques for Forecasting, Trading and Hedging 4Q Springer Contents 1 Introduction to
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION. Abstract
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges, Associate Professor Rayford B. Vaughn, Associate Professor Department of Computer Science Mississippi State University
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
Firewall Policy Anomalies- Detection and Resolution
Firewall Policy Anomalies- Detection and Resolution Jitha C K #1, Sreekesh Namboodiri *2 #1 MTech student(cse),mes College of Engineering,Kuttippuram,India #2 Assistant Professor(CSE),MES College of Engineering,Kuttippuram,India
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
Denial-Of -Service Attack Detection Using KDD
Denial-Of -Service Attack Detection Using KDD Prof. Pankaj Salunkhe 1,Mayur Shishupal 2 1 Head of Department (Electronics & Telecommunication Engineering), YTIET, Bhivpuri [MH], India 2 Pursuing Master
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges [email protected] Rayford B. Vaughn [email protected] 23 rd National Information Systems Security Conference
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
GA as a Data Optimization Tool for Predictive Analytics
GA as a Data Optimization Tool for Predictive Analytics Chandra.J 1, Dr.Nachamai.M 2,Dr.Anitha.S.Pillai 3 1Assistant Professor, Department of computer Science, Christ University, Bangalore,India, [email protected]
Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm
Journal of Al-Nahrain University Vol.15 (2), June, 2012, pp.161-168 Science Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm Manal F. Younis Computer Department, College
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Intrusion Detection System (IDS)
Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection
Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection Authors: Aly El-Semary, Janica Edmonds, Jesús González-Pino, and Mauricio Papa Center for Information Security Department
Neural Networks for Intrusion Detection and Its Applications
, July 3-5, 2013, London, U.K. Neural Networks for Intrusion Detection and Its Applications E.Kesavulu Reddy, Member IAENG Abstract: With rapid expansion of computer networks during the past decade, security
Efficiently Managing Firewall Conflicting Policies
Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering
How to Detect and Prevent Cyber Attacks
Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security Stephen G. Batsell 1, Nageswara S. Rao 2, Mallikarjun Shankar 1 1 Computational Sciences and Engineering Division
An Application of Machine Learning to Network Intrusion Detection
An Application of Machine Learning to Network Intrusion Detection Chris Sinclair Applied Research Laboratories The University of Texas at Austin sinclair@arlututexasedu Lyn Pierce epierce@arlututexasedu
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
A New Method for Traffic Forecasting Based on the Data Mining Technology with Artificial Intelligent Algorithms
Research Journal of Applied Sciences, Engineering and Technology 5(12): 3417-3422, 213 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 213 Submitted: October 17, 212 Accepted: November
Virtual Host based Intrusion Detection System for Cloud
Virtual Host based Intrusion Detection System for Cloud Manthira Moorthy S #1, Rajeswari M #2 # Department of Computer Science and Engineering, Hindustan University P.O.Box No.1, Rajiv Gandhi Salai (OMR),
HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b
Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion
14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO)
Overview Kyrre Glette kyrrehg@ifi INF3490 Swarm Intelligence Particle Swarm Optimization Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) 3 Swarms in nature Fish, birds,
Concept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
City Research Online. Permanent City Research Online URL: http://openaccess.city.ac.uk/1737/
Modi, C., Patel, D., Patel, H., Borisaniya, B., Patel, A. & Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1), pp. 42-57. doi:
IMPROVED OFF-LINE INTRUSION DETECTION USING A GENETIC ALGORITHM
IMPROVED OFF-LINE INTRUSION DETECTION USING A GENETIC ALGORITHM Pedro A. Diaz-Gomez Ingenieria de Sistemas, Universidad El Bosque Bogota, Colombia Email: [email protected] Dean F. Hougen Robotics, Evolution,
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks
Distributed Sensor Networks, Article ID 351047, 6 pages http://dx.doi.org/10.1155/2013/351047 Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks
Intrusion Detection for Grid and Cloud Computing
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal University of Santa Catarina, Brazil Content Type
LOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTING Neethu M.S 1 PG Student, Dept. of Computer Science and Engineering, LBSITW (India) ABSTRACT Cloud computing is emerging as a new paradigm for manipulating, configuring,
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Contents. Dedication List of Figures List of Tables. Acknowledgments
Contents Dedication List of Figures List of Tables Foreword Preface Acknowledgments v xiii xvii xix xxi xxv Part I Concepts and Techniques 1. INTRODUCTION 3 1 The Quest for Knowledge 3 2 Problem Description
