Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator
ACM Transactions on Modeling and Computer Simulation (TOMACS) - Special issue on uniform random number generation
How to solve it: modern heuristics
How to solve it: modern heuristics
CDIS: Towards a Computer Immune System for Detecting Network Intrusions
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Multiobjective evolutionary algorithms: classifications, analyses, and new innovations
Multiobjective evolutionary algorithms: classifications, analyses, and new innovations
Multiobjective Evolutionary Algorithms: Analyzing the State-of-the-Art
Evolutionary Computation
An evolutionary programming approach for detecting novel computer network attacks
CEC '02 Proceedings of the Evolutionary Computation on 2002. CEC '02. Proceedings of the 2002 Congress - Volume 02
The computer defense immune system: current and future research in intrusion detection
CEC '02 Proceedings of the Evolutionary Computation on 2002. CEC '02. Proceedings of the 2002 Congress - Volume 02
Hi-index | 0.00 |
Attacks against computer networks are becoming more sophisticated, with adversaries using new attacks or modifying existing attacks. This research uses three different types of multiobjective approaches, one lexicographic and two Pareto-based, in a multiobjective evolutionary programming algorithm to develop a new method for detecting such attacks. The approach evolves finite state transducers to detect attacks; this approach may allow the system to detect attacks with features similar to known attacks. Also, the approach examines the solution quality of each detector. Initial testing shows the algorithm performs satisfactorily in generating finite state transducers capable of detecting attacks.