Punctuated equilibria: a parallel genetic algorithm
Proceedings of the Second International Conference on Genetic Algorithms on Genetic algorithms and their application
An Introduction to Genetic Algorithms for Scientists and Engineers
An Introduction to Genetic Algorithms for Scientists and Engineers
Neural Networks: A Comprehensive Foundation
Neural Networks: A Comprehensive Foundation
Cisco Secure Intrusion Detection Systems
Cisco Secure Intrusion Detection Systems
Theory and Practice of Uncertain Programming
Theory and Practice of Uncertain Programming
Stateful Intrusion Detection for High-Speed Networks
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Letters: Fully complex extreme learning machine
Neurocomputing
Expected value of fuzzy variable and fuzzy expected value models
IEEE Transactions on Fuzzy Systems
Hi-index | 0.00 |
This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the “Distributed Network Security Sensors” distributed among the nodes of the internal network to monitor traffic. We study the tradeoff between cost and monitoring coverage to determine the positions and processing rates of the sensors. To handle the uncertain nature of flow, we build fuzzy expected value optimization models and develop a hybrid intelligent algorithm to obtain the deployment strategy. From the experiments in actual and synthesized network topologies, we observe that a small number of low-speed sensors are sufficient to maintain a high monitoring coverage. It also depicts that deploying DSS is much more efficient in larger topologies.