C4.5: programs for machine learning
C4.5: programs for machine learning
Secure computing: threats and safeguards
Secure computing: threats and safeguards
Estimation of Distribution Algorithms: A New Tool for Evolutionary Computation
Estimation of Distribution Algorithms: A New Tool for Evolutionary Computation
Machine Learning
Expanding from Discrete to Continuous Estimation of Distribution Algorithms: The IDEA
PPSN VI Proceedings of the 6th International Conference on Parallel Problem Solving from Nature
A Factorized Distribution Algorithm Using Single Connected Bayesian Networks
PPSN VI Proceedings of the 6th International Conference on Parallel Problem Solving from Nature
A Neural Network Component for an Intrusion Detection System
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Adaptive Neuro-Fuzzy Intrusion Detection Systems
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Intrusion detection using an ensemble of intelligent paradigms
Journal of Network and Computer Applications - Special issue on computational intelligence on the internet
Time-series forecasting using flexible neural tree model
Information Sciences: an International Journal
Feature selection and intrusion detection using hybrid flexible neural tree
ISNN'05 Proceedings of the Second international conference on Advances in Neural Networks - Volume Part III
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Hi-index | 0.00 |
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. An IDS does not eliminate the use of preventive mechanism but it works as the last defensive mechanism in securing the system. This paper evaluates the performances of Estimation of Distribution Algorithm (EDA) to train a feedforward neural network classifier for detecting intrusions in a network. Results are then compared with Particle Swarm Optimization (PSO) based neural classifier and Decision Trees (DT). Empirical results clearly show that evolutionary computing techniques could play an important role in designing real time intrusion detection systems.