Machine Learning
Foundations of Genetic Algorithms
Foundations of Genetic Algorithms
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
The Distributed Constraint Satisfaction Problem: Formalization and Algorithms
IEEE Transactions on Knowledge and Data Engineering
Zen and the Art of Genetic Algorithms
Proceedings of the 3rd International Conference on Genetic Algorithms
Coverage and Generalization in an Artificial Immune System
GECCO '02 Proceedings of the Genetic and Evolutionary Computation Conference
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
An immunological model of distributed detection and its application to computer security
An immunological model of distributed detection and its application to computer security
Revisiting LISYS: parameters and normal behavior
CEC '02 Proceedings of the Evolutionary Computation on 2002. CEC '02. Proceedings of the 2002 Congress - Volume 02
An immunity-based technique to characterize intrusions in computernetworks
IEEE Transactions on Evolutionary Computation
Hi-index | 0.00 |
The GENERTIA red team uses a genetic algorithm to perform vulnerability analysis in an effort to discover holes in an intrusion detection system. This paper demonstrates how a GENERTIA blue team generates detectors to patch those holes discovered by the GRT. The GBT uses a novel approach to generate detectors that have different coverage in order to reduce the amount of overlap of detectors created by random generation and negative selection.