C4.5: programs for machine learning
C4.5: programs for machine learning
Secure computing: threats and safeguards
Secure computing: threats and safeguards
Estimation of Distribution Algorithms: A New Tool for Evolutionary Computation
Estimation of Distribution Algorithms: A New Tool for Evolutionary Computation
Machine Learning
Expanding from Discrete to Continuous Estimation of Distribution Algorithms: The IDEA
PPSN VI Proceedings of the 6th International Conference on Parallel Problem Solving from Nature
A Factorized Distribution Algorithm Using Single Connected Bayesian Networks
PPSN VI Proceedings of the 6th International Conference on Parallel Problem Solving from Nature
Adaptive Neuro-Fuzzy Intrusion Detection Systems
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Time-series forecasting using flexible neural tree model
Information Sciences: an International Journal
Feature selection and intrusion detection using hybrid flexible neural tree
ISNN'05 Proceedings of the Second international conference on Advances in Neural Networks - Volume Part III
Classification of wetland from TM imageries based on decision tree
WSEAS Transactions on Information Science and Applications
Classification of wetland from TM imageries based on decision tree
WSEAS Transactions on Information Science and Applications
Hi-index | 0.00 |
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. An IDS does not eliminate the use of preventive mechanism but it works as the last defensive mechanism in securing the system. This paper evaluates the performances of Estimation of Distribution Algorithm (EDA) to train a feedforward neural network classifier for detecting intrusions in a network. Results are then compared with Particle Swarm Optimization (PSO) based neural classifier and Decision Trees (DT). Empirical results clearly show that evolutionary computing techniques could play an important role in designing real time intrusion detection systems.