The Strength of Weak Learnability
Machine Learning
Boosting a weak learning algorithm by majority
Information and Computation
Machine Learning
ACM Transactions on Information and System Security (TISSEC)
The Case against Accuracy Estimation for Comparing Induction Algorithms
ICML '98 Proceedings of the Fifteenth International Conference on Machine Learning
Modeling intrusion detection systems using linear genetic programming approach
IEA/AIE'2004 Proceedings of the 17th international conference on Innovations in applied artificial intelligence
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition (Morgan Kaufmann Series in Data Management Systems)
Modeling intrusion detection system using hybrid intelligent systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
A linear genetic programming approach to intrusion detection
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartII
AAAI'96 Proceedings of the thirteenth national conference on Artificial intelligence - Volume 1
GP ensemble for distributed intrusion detection systems
ICAPR'05 Proceedings of the Third international conference on Advances in Pattern Recognition - Volume Part I
Parallelism and evolutionary algorithms
IEEE Transactions on Evolutionary Computation
A scalable cellular implementation of parallel genetic programming
IEEE Transactions on Evolutionary Computation
Training genetic programming on half a million patterns: an example from anomaly detection
IEEE Transactions on Evolutionary Computation
GP ensembles for large-scale data classification
IEEE Transactions on Evolutionary Computation
EEM: evolutionary ensembles model for activity recognition in Smart Homes
Applied Intelligence
Hi-index | 0.00 |
A distributed data mining algorithm to improve the detection accuracy when classifying malicious or unauthorized network activity is presented. The algorithm is based on genetic programming (GP) extended with the ensemble paradigm. GP ensemble is particularly suitable for distributed intrusion detection because it allows to build a network profile by combining different classifiers that together provide complementary information. The main novelty of the algorithm is that data is distributed across multiple autonomous sites and the learner component acquires useful knowledge from this data in a cooperative way. The network profile is then used to predict abnormal behavior. Experiments on the KDD Cup 1999 Data show the capability of genetic programming in successfully dealing with the problem of intrusion detection on distributed data.