Genetic programming: on the programming of computers by means of natural selection
Genetic programming: on the programming of computers by means of natural selection
Genetic programming: an introduction: on the automatic evolution of computer programs and its applications
Wattch: a framework for architectural-level power analysis and optimizations
Proceedings of the 27th annual international symposium on Computer architecture
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks
Mobile Networks and Applications
Experiences with Specification-Based Intrusion Detection
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Grammatical Evolution: Evolving Programs for an Arbitrary Language
EuroGP '98 Proceedings of the First European Workshop on Genetic Programming
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 2 - Volume 2
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Grammatical Evolution: Evolutionary Automatic Programming in an Arbitrary Language
Grammatical Evolution: Evolutionary Automatic Programming in an Arbitrary Language
How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols
How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Introduction to Evolutionary Computing
Introduction to Evolutionary Computing
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
A General Cooperative Intrusion Detection Architecture for MANETs
IWIA '05 Proceedings of the Third IEEE International Workshop on Information Assurance
Detecting Critical Nodes for MANET Intrusion Detection Systems
SECPERU '06 Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing
Hybrid Agents for Power-Aware Intrusion Detection in Highly Mobile Ad Hoc Networks
ICSNC '06 Proceedings of the International Conference on Systems and Networks Communication
Strongly typed genetic programming
Evolutionary Computation
A grammatical evolution approach to intrusion detection on mobile ad hoc networks
Proceedings of the second ACM conference on Wireless network security
A Rigorous Evaluation of Crossover and Mutation in Genetic Programming
EuroGP '09 Proceedings of the 12th European Conference on Genetic Programming
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
Genetic programming in wireless sensor networks
EuroGP'05 Proceedings of the 8th European conference on Genetic Programming
A novel intrusion detection method for mobile ad hoc networks
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
DEMEM: distributed evidence-driven message exchange intrusion detection model for MANET
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
Training genetic programming on half a million patterns: an example from anomaly detection
IEEE Transactions on Evolutionary Computation
Review: Intrusion detection system: A comprehensive review
Journal of Network and Computer Applications
Engineering Applications of Artificial Intelligence
Hi-index | 0.00 |
Intrusion detection on mobile ad hoc networks (MANETs) is difficult. This is because of their dynamic nature, the lack of central points, and their highly resource-constrained nodes. In this paper we explore the use of evolutionary computation techniques, particularly genetic programming and grammatical evolution, to evolve intrusion detection programs for such challenging environments. Cognizant of the particular importance of power efficiency we analyse the power consumption of evolved programs and employ a multi-objective evolutionary algorithm to discover optimal trade-offs between intrusion detection ability and power consumption.