International Journal of Man-Machine Studies
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
The dynamics of collective sorting robot-like ants and ant-like robots
Proceedings of the first international conference on simulation of adaptive behavior on From animals to animats
Adaptation in natural and artificial systems
Adaptation in natural and artificial systems
Genetic programming: on the programming of computers by means of natural selection
Genetic programming: on the programming of computers by means of natural selection
Communications of the ACM
Mining fuzzy association rules in databases
ACM SIGMOD Record
Computational intelligence: a logical approach
Computational intelligence: a logical approach
Genetic programming: an introduction: on the automatic evolution of computer programs and its applications
Principles of a computer immune system
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Intrusion detection with neural networks
NIPS '97 Proceedings of the 1997 conference on Advances in neural information processing systems 10
Towards a taxonomy of intrusion-detection systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
What is evolutionary computation?
IEEE Spectrum
ACM Transactions on Information and System Security (TISSEC)
Self-Organizing Maps
CDIS: Towards a Computer Immune System for Detecting Network Intrusions
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Coverage and Generalization in an Artificial Immune System
GECCO '02 Proceedings of the Genetic and Evolutionary Computation Conference
An Eye on Network Intruder-Administrator Shootouts
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
Generating Optimal Repertoire of Antibody Strings in an Artificial Immune System
Proceedings of the IIS'2000 Symposium on Intelligent Information Systems
Detecting Anomalous and Unknown Intrusions Against Programs
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
An Application of Machine Learning to Network Intrusion Detection
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Results of the KDD'99 classifier learning
ACM SIGKDD Explorations Newsletter
Applying CMAC-Based On-Line Learning to Intrusion Detection
IJCNN '00 Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN'00)-Volume 5 - Volume 5
A Computer Host-Based User Anomaly Detection System Using the Self-Organizing Map
IJCNN '00 Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN'00)-Volume 5 - Volume 5
A Neural Network Component for an Intrusion Detection System
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
An immunological model of distributed detection and its application to computer security
An immunological model of distributed detection and its application to computer security
Anomaly Detection Using Real-Valued Negative Selection
Genetic Programming and Evolvable Machines
A Comparative Study of Techniques for Intrusion Detection
ICTAI '03 Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence
Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 9 - Volume 9
Unsupervised learning techniques for an intrusion detection system
Proceedings of the 2004 ACM symposium on Applied computing
Adaptive Neuro-Fuzzy Intrusion Detection Systems
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Artificial Immune Recognition System (AIRS): An Immune-Inspired Supervised Learning Algorithm
Genetic Programming and Evolvable Machines
Immune Memory and Gene Library Evolution in the Dynamic Clonal Selection Algorithm
Genetic Programming and Evolvable Machines
An approach to implement a network intrusion detection system using genetic algorithms
SAICSIT '04 Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Hybrid BP/CNN neural network for intrusion detection
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Intrusion detection using an ensemble of intelligent paradigms
Journal of Network and Computer Applications - Special issue on computational intelligence on the internet
Estimating the detector coverage in a negative selection algorithm
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Is negative selection appropriate for anomaly detection?
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Applying both positive and negative selection to supervised learning for anomaly detection
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
A comparative analysis of artificial immune network models
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Analysis and mathematical justification of a fitness function used in an intrusion detection system
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection
SNPD-SAWN '05 Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks
Using artificial anomalies to detect unknown and known network intrusions
Knowledge and Information Systems
MILA – multilevel immune learning algorithm and its application to anomaly detection
Soft Computing - A Fusion of Foundations, Methodologies and Applications
Handbook Of Bioinspired Algorithms And Applications (Chapman & Hall/Crc Computer & Information Science)
802.11 network intrusion detection using genetic programming
GECCO '05 Proceedings of the 7th annual workshop on Genetic and evolutionary computation
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Evolving Successful Stack Overflow Attacks for Vulnerability Testing
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
IDEAS: Intrusion Detection based on Emotional Ants for Sensors
ISDA '05 Proceedings of the 5th International Conference on Intelligent Systems Design and Applications
How Do We Evaluate Artificial Immune Systems?
Evolutionary Computation
A Machine Learning Evaluation of an Artificial Immune System
Evolutionary Computation
Intrusion Detection Combining Multiple Decision Trees by Fuzzy logic
PDCAT '05 Proceedings of the Sixth International Conference on Parallel and Distributed Computing Applications and Technologies
Modeling intrusion detection systems using linear genetic programming approach
IEA/AIE'2004 Proceedings of the 17th international conference on Innovations in applied artificial intelligence
Genetic Programming Based WiFi Data Link Layer Attack Detection
CNSR '06 Proceedings of the 4th Annual Communication Networks and Services Research Conference
Applicability issues of the real-valued negative selection algorithms
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Immune anomaly detection enhanced with evolutionary paradigms
Proceedings of the 8th annual conference on Genetic and evolutionary computation
To identify suspicious activity in anomaly detection based on soft computing
AIA'06 Proceedings of the 24th IASTED international conference on Artificial intelligence and applications
Clustering based on Self-Organizing Ant Colony Networks with Application to Intrusion Detection
ISDA '06 Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications - Volume 02
A Genetic Algorithm Approach for Doing Misuse Detection in Audit Trail Files
CIC '06 Proceedings of the 15th International Conference on Computing
Anomaly-Based Intrusion Detection using Fuzzy Rough Clustering
ICHIT '06 Proceedings of the 2006 International Conference on Hybrid Information Technology - Volume 01
An unsupervised anomaly detection framework for multiple-connection based network intrusions
An unsupervised anomaly detection framework for multiple-connection based network intrusions
Artificial immune systems---today and tomorrow
Natural Computing: an international journal
A hierarchical SOM-based intrusion detection system
Engineering Applications of Artificial Intelligence
Negative selection algorithms: from the thymus to v-detector
Negative selection algorithms: from the thymus to v-detector
Adaptive anomaly detection with evolving connectionist systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
D-SCIDS: distributed soft computing intrusion detection system
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Modeling intrusion detection system using hybrid intelligent systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Intrusion detection using a fuzzy genetics-based learning algorithm
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
A study in using neural networks for anomaly and misuse detection
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
CEC '02 Proceedings of the Evolutionary Computation on 2002. CEC '02. Proceedings of the 2002 Congress - Volume 02
The computer defense immune system: current and future research in intrusion detection
CEC '02 Proceedings of the Evolutionary Computation on 2002. CEC '02. Proceedings of the 2002 Congress - Volume 02
Revisiting LISYS: parameters and normal behavior
CEC '02 Proceedings of the Evolutionary Computation on 2002. CEC '02. Proceedings of the 2002 Congress - Volume 02
Using Neuro-Fuzzy Approach to Reduce False Positive Alerts
CNSR '07 Proceedings of the Fifth Annual Conference on Communication Networks and Services Research
Revisiting Negative Selection Algorithms
Evolutionary Computation
Proceedings of the 9th annual conference companion on Genetic and evolutionary computation
Dendritic cells for SYN scan detection
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Pareto-coevolutionary genetic programming for problem decomposition in multi-class classification
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Improving network security using genetic algorithm approach
Computers and Electrical Engineering
Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set
Intelligent Data Analysis
Immune system approaches to intrusion detection --- a review
Natural Computing: an international journal
A Feedback Negative Selection Algorithm to Anomaly Detection
ICNC '07 Proceedings of the Third International Conference on Natural Computation - Volume 03
An Improved Ant-based Classifier for Intrusion Detection
ICNC '07 Proceedings of the Third International Conference on Natural Computation - Volume 04
A parallel genetic local search algorithm for intrusion detection in computer networks
Engineering Applications of Artificial Intelligence
Sensing danger: Innate immunology for intrusion detection
Information Security Tech. Report
Using genetic algorithms to explore pattern recognition in the immune system
Evolutionary Computation
Search-intensive concept induction
Evolutionary Computation
Using grammatical evolution for evolving intrusion detection rules
CSECS'06 Proceedings of the 5th WSEAS International Conference on Circuits, Systems, Electronics, Control & Signal Processing
Intrusion detection with evolutionary learning classifier systems
Natural Computing: an international journal
Information fusion for anomaly detection with the dendritic cell algorithm
Information Fusion
Natural niching for evolving cooperative classifiers
GECCO '96 Proceedings of the 1st annual conference on Genetic and evolutionary computation
A linear genetic programming approach to intrusion detection
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartII
The effect of binary matching rules in negative selection
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
Intrusion detection in computer networks with neural and fuzzy classifiers
ICANN/ICONIP'03 Proceedings of the 2003 joint international conference on Artificial neural networks and neural information processing
A novel fast negative selection algorithm enhanced by state graphs
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
Comparison of BPL and RBF network in intrusion detection system
RSFDGrC'03 Proceedings of the 9th international conference on Rough sets, fuzzy sets, data mining, and granular computing
Modeling of distributed intrusion detection using fuzzy system
ICIC'06 Proceedings of the 2006 international conference on Intelligent computing: Part II
A nonself space approach to network anomaly detection
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Linear Genetic Programming
GP ensemble for distributed intrusion detection systems
ICAPR'05 Proceedings of the Third international conference on Advances in Pattern Recognition - Volume Part I
Gene libraries: coverage, efficiency and diversity
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Integrating innate and adaptive immunity for intrusion detection
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
The role of early stopping and population size in XCS for intrusion detection
SEAL'06 Proceedings of the 6th international conference on Simulated Evolution And Learning
Intrusion detection using emergent self-organizing maps
SETN'06 Proceedings of the 4th Helenic conference on Advances in Artificial Intelligence
Can evolutionary computation handle large datasets? a study into network intrusion detection
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
Immune clonal selection wavelet network based intrusion detection
ICANN'05 Proceedings of the 15th international conference on Artificial Neural Networks: biological Inspirations - Volume Part I
Intrusion detection based on fuzzy neural networks
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
A novel fuzzy anomaly detection method based on clonal selection clustering algorithm
ICMLC'05 Proceedings of the 4th international conference on Advances in Machine Learning and Cybernetics
Applying genetic programming to evolve learned rules for network anomaly detection
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
Analyzing TCP traffic patterns using self organizing maps
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
MEPIDS: multi-expression programming for intrusion detection system
IWINAC'05 Proceedings of the First international work-conference on the Interplay Between Natural and Artificial Computation conference on Artificial Intelligence and Knowledge Engineering Applications: a bioinspired approach - Volume Part II
Detecting anomalous network traffic with combined fuzzy-based approaches
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
Immune clonal selection algorithm for multiuser detection in DS-CDMA systems
AI'04 Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence
Intrusion detection based on immune clonal selection algorithms
AI'04 Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence
Unsupervised anomaly detection based n an evolutionary artificial immune network
EC'05 Proceedings of the 3rd European conference on Applications of Evolutionary Computing
What have gene libraries done for AIS?
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Two ways to grow tissue for artificial immune systems
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
A comparative study of real-valued negative selection to statistical anomaly detection techniques
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
ICAISC'06 Proceedings of the 8th international conference on Artificial Intelligence and Soft Computing
Advances in artificial immune systems
IEEE Computational Intelligence Magazine
Incorporating soft computing techniques into a probabilistic intrusion detection system
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Learning and optimization using the clonal selection principle
IEEE Transactions on Evolutionary Computation
An artificial immune system architecture for computer securityapplications
IEEE Transactions on Evolutionary Computation
An immunity-based technique to characterize intrusions in computernetworks
IEEE Transactions on Evolutionary Computation
Data mining with an ant colony optimization algorithm
IEEE Transactions on Evolutionary Computation
Training genetic programming on half a million patterns: an example from anomaly detection
IEEE Transactions on Evolutionary Computation
A formal framework for positive and negative detection schemes
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Hierarchical Kohonenen net for anomaly detection in network security
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Evolutionary neural networks for anomaly detection based on the behavior of a program
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Training a neural-network based intrusion detector to recognize novel attacks
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Intrusion detection through learning behavior model
Computer Communications
A cooperative immunological approach for detecting network anomaly
Applied Soft Computing
Structural damage detection using fuzzy cognitive maps and Hebbian learning
Applied Soft Computing
CollSec'10 Proceedings of the 2010 international conference on Collaborative methods for security and privacy
Solving the constrained p-center problem using heuristic algorithms
Applied Soft Computing
Mutual information-based feature selection for intrusion detection systems
Journal of Network and Computer Applications
Alert correlation in collaborative intelligent intrusion detection systems-A survey
Applied Soft Computing
Expert Systems with Applications: An International Journal
Practical real-time intrusion detection using machine learning approaches
Computer Communications
Review: Adaptive cruise control look-ahead system for energy management of vehicles
Expert Systems with Applications: An International Journal
Audio based solutions for detecting intruders in wild areas
Signal Processing
Computational intelligence algorithms analysis for smart grid cyber security
ICSI'10 Proceedings of the First international conference on Advances in Swarm Intelligence - Volume Part II
Growing Self-Organizing Map with cross insert for mixed-type data clustering
Applied Soft Computing
A hybrid network intrusion detection system using simplified swarm optimization (SSO)
Applied Soft Computing
SDAI: An integral evaluation methodology for content-based spam filtering models
Expert Systems with Applications: An International Journal
An Optimum-Path Forest framework for intrusion detection in computer networks
Engineering Applications of Artificial Intelligence
Review: An intrusion detection and prevention system in cloud computing: A systematic review
Journal of Network and Computer Applications
An ecological approach to anomaly detection: the EIA model
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
Journal of Network and Systems Management
Applying case based reasoning for prioritizing areas of business management
Expert Systems with Applications: An International Journal
Dynamic learning model update of hybrid-classifiers for intrusion detection
The Journal of Supercomputing
Engineering Applications of Artificial Intelligence
Performance analysis of machine learning algorithms for intrusion detection in MANETs
International Journal of Wireless and Mobile Computing
Trustworthy placements: Improving quality and resilience in collaborative attack detection
Computer Networks: The International Journal of Computer and Telecommunications Networking
A distance sum-based hybrid method for intrusion detection
Applied Intelligence
Hi-index | 0.01 |
Intrusion detection based upon computational intelligence is currently attracting considerable interest from the research community. Characteristics of computational intelligence (CI) systems, such as adaptation, fault tolerance, high computational speed and error resilience in the face of noisy information, fit the requirements of building a good intrusion detection model. Here we want to provide an overview of the research progress in applying CI methods to the problem of intrusion detection. The scope of this review will encompass core methods of CI, including artificial neural networks, fuzzy systems, evolutionary computation, artificial immune systems, swarm intelligence, and soft computing. The research contributions in each field are systematically summarized and compared, allowing us to clearly define existing research challenges, and to highlight promising new research directions. The findings of this review should provide useful insights into the current IDS literature and be a good source for anyone who is interested in the application of CI approaches to IDSs or related fields.