Genetic Algorithms in Search, Optimization and Machine Learning
Genetic Algorithms in Search, Optimization and Machine Learning
Snort 2.1 Intrusion Detection, Second Edition
Snort 2.1 Intrusion Detection, Second Edition
Proceedings of the 9th annual conference companion on Genetic and evolutionary computation
Design of a Snort-Based Hybrid Intrusion Detection System
IWANN '09 Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part II: Distributed Computing, Artificial Intelligence, Bioinformatics, Soft Computing, and Ambient Assisted Living
Multiobjective evolutionary algorithms: a comparative case studyand the strength Pareto approach
IEEE Transactions on Evolutionary Computation
IDS false alarm reduction using an instance selection KNN-memetic algorithm
International Journal of Metaheuristics
Hi-index | 0.00 |
Attacks against computer systems are becoming more complex, making it necessary to develop new security systems continually, such as Intrusion Detection Systems (IDS) which provide security for computer systems by distinguishing between hostile and non-hostile activity. With the aim of minimizing the number of wrong decisions of a misuse (signature-based) IDS, an optimization strategy for automatic rule generation is presented. This optimizer is a Pareto-based multi-objective evolutionary algorithm included within a network IDS, which has been evaluated using a benchmark dataset. The results obtained show the advantages of using this multi-objective approach.