Intrusion detection
Evolutionary Computation: The Fossil Record
Evolutionary Computation: The Fossil Record
Computational Intelligence: An Introduction
Computational Intelligence: An Introduction
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
A grammatical evolution approach to intrusion detection on mobile ad hoc networks
Proceedings of the second ACM conference on Wireless network security
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Features selection for intrusion detection systems based on support vector machines
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Computational intelligence for network intrusion detection: recent contributions
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
Engineering self-protection for autonomous systems
FASE'06 Proceedings of the 9th international conference on Fundamental Approaches to Software Engineering
The application of genetic algorithm to intrusion detection in MP2P network
ICSI'12 Proceedings of the Third international conference on Advances in Swarm Intelligence - Volume Part I
Features selection approaches for intrusion detection systems based on evolution algorithms
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.00 |
As the transmission of data over the internet increases, the need to protect connected systems also increases. Intrusion Detection Systems (IDSs) are the latest technology used for this purpose. Although the field of IDSs is still developing, the systems that do exist are still not complete, in the sense that they are not able to detect all types of intrusions. Some attacks which are detected by various tools available today cannot be detected by other products, depending on the types and methods that they are built on. Using a Genetic Algorithm (GA) is one of the methods that IDSs use to detect intrusions. They incorporate the concept of Darwin's theory and natural selection to detect intrusions. Not much research has been conducted in this area besides the Genetic Algorithm as an Alternative Tool for Security Audit Trails Analysis (GASSATA) tool; there are very few IDSs that are completely developed from using GAs. The focus of this paper is to introduce the application of GA, in order to improve the effectiveness of IDSs.