tual number of possible intrusions found K. For each
type of activity M, it checks the common type of ac-
tivity in order to check for violations of constraints.
So for this case it spends M ∗ K computation time,
where K < N. In conclusion, the iterative process is
O(MN).
For the case of the GA, it depends on the popula-
tion size S, number of generations G and length M of
each P array. So, for each hypothesized array OZ—of
length N, and the ones that belong to the population—
the algorithm performs N calculations for each type of
activity, and as there are M types of activity, this gives
M ∗ N calculations. As the population size is S, for
each generation the algorithm performs M ∗ N ∗ P cal-
culations. As the algorithm has G generations, it gives
a total computational complexity of order O(MNSG).
Clearly, the GA cost is higher by O(PG) with the
down side of a false negative ratio that depends in part
on the population size (see Fig 3).
The computational complexity done by both algo-
rithms in finding the disjointed sets of possible intru-
sions is O(K
2
M), where K is the cardinality of the
disjointed set X (see section 3.1).
The space complexity is such that both algorithms
have to store the matrix of known intrusions and the
user activity (see Figure 1). The GA, additionally, has
to store the population that is of order O(SN).
4 CONCLUSIONS AND FUTURE
WORK
In this position paper we continue our previous work
(Diaz-Gomez and Hougen, 2005a; Diaz-Gomez and
Hougen, 2006; Diaz-Gomez and Hougen, 2005c;
Diaz-Gomez and Hougen, 2005b) using a GA for
doing misuse detection in log files, expanding the
number of intrusion arrays from 48 to 1, 008. Be-
sides that, the performance of an iterative process was
compared with a current implementation of a GA,
looking at the false negative ratio and computational
complexity of both algorithms. The iterative process
outperformed the GA for the test set, as established
by the false negative ratio and in computational and
space complexity. The population size of the GA
was increased in order to improve the quality of the
solution—fewer false negatives—but other parame-
ters may be changed in the GA as well, such as the
number of generations and the probability of the op-
erators, in trying to improve its performance. How-
ever, some of those possible changes may or may not
improve the quality of the solution and some may ex-
pend more computation time. The correct setting of
parameters is one of the difficulties in working with
GAs. Other heuristic methods, like neural networks,
can be addressed in order to continue comparing the
iterative process and the GA examined in this paper.
REFERENCES
Bace, R. G. (2000). Intrusion Detection. MacMillan Tech-
nical Publishing, USA.
Crosbie, M. and Spafford, G. (1995). Applying genetic pro-
gramming to intrusion detection. In Proceedings of
the AAAI Fall Symposium, pages 1–8.
Denning, D. E. (1986). An intrusion-detection model. In
Proceedings of the IEEE Symposium on Security and
Privacy, pages 118–131.
Diaz-Gomez, P. A. and Hougen, D. F. (2005a). Analysis and
mathematical justification of a fitness function used in
an intrusion detection system. In Proceedings of the
Genetic and Evolutionary Computation Conference,
pages 1591–1592.
Diaz-Gomez, P. A. and Hougen, D. F. (2005b). Analysis
of an off-line intrusion detection system: A case study
in multi-objective genetic algorithms. In Proceedings
of the Florida Artificial Intelligence Research Society
Conference, pages 822–823.
Diaz-Gomez, P. A. and Hougen, D. F. (2005c). Improved
off-line intrusion detection using a genetic algorithm.
In Proceedings of the 7th International Conference on
Enterprise Information Systems, pages 66–73.
Diaz-Gomez, P. A. and Hougen, D. F. (2006). A genetic al-
gorithm approach for doing misuse detection in audit
trail files. In Proceedings of the CIC-2006 Interna-
tional Conference on Computing, pages 329–335.
M
´
e, L. (1993). Security audit trail analysis using genetic
algorithms. In Proceedings of the 12th. International
Conference on Computer Safety, Reliability, and Se-
curity, pages 329–340.
M
´
e, L. (1998). GASSATA, a genetic algorithm as an alter-
native tool for security audit trail analysis. In Proceed-
ings of the First International Workshop on the Recent
Advances in Intrusion Detection.
Mitchell, M. (1998). An Introduction to Genetic Algo-
rithms. MIT Press.
Tjaden, B. C. (2004). Fundamentals of Secure Computer
Systems. Franklin and Beedle & Associates.
ICEIS 2007 - International Conference on Enterprise Information Systems
458