Computer systems that learn: classification and prediction methods from statistics, neural nets, machine learning, and expert systems
Practical UNIX security
Learning experiments with genetic optimization of a generalized regression neural network
Decision Support Systems - Special double issue: unified programming
Genetic programming: an introduction: on the automatic evolution of computer programs and its applications
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Principles of a computer immune system
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
A smart itsy bitsy spider for the web
Journal of the American Society for Information Science - Special topic issue: artificial intelligence techniques for emerging information systems applications
A framework for constructing features and models for intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
Foundations of genetic programming
Foundations of genetic programming
Cybercrime Cyberterrorism Cyberwarfare: Averting an Electronic Waterloo
Cybercrime Cyberterrorism Cyberwarfare: Averting an Electronic Waterloo
Data Mining Using Grammar-Based Genetic Programming and Applications
Data Mining Using Grammar-Based Genetic Programming and Applications
Cyber Threats and Information Security: Meeting the 21st Century Challenge
Cyber Threats and Information Security: Meeting the 21st Century Challenge
Networks and Netwars: The Future of Terror, Crime and Militancy
Networks and Netwars: The Future of Terror, Crime and Militancy
Genetic Programming Experiments with Standard and Homologous Crossover Methods
Genetic Programming and Evolvable Machines
Crossover in Grammatical Evolution
Genetic Programming and Evolvable Machines
Genetic Programming for Feature Discovery and Image Discrimination
Proceedings of the 5th International Conference on Genetic Algorithms
Measuring Factors that Influence the Success of Internet Commerce
Information Systems Research
Detecting Anomalous and Unknown Intrusions Against Programs
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Building Diverse Computer Systems
HOTOS '97 Proceedings of the 6th Workshop on Hot Topics in Operating Systems (HotOS-VI)
Results of the KDD'99 classifier learning
ACM SIGKDD Explorations Newsletter
Winning the KDD99 classification cup: bagged boosting
ACM SIGKDD Explorations Newsletter
Computer and Intrusion Forensics
Computer and Intrusion Forensics
LISA '98 Proceedings of the 12th USENIX conference on System administration
Snort - Lightweight Intrusion Detection for Networks
LISA '99 Proceedings of the 13th USENIX conference on System administration
Architecture for an Artificial Immune System
Evolutionary Computation
Intrusion detection using sequences of system calls
Journal of Computer Security
Using support vector machines for terrorism information extraction
ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
Authorship analysis in cybercrime investigation
ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
Addressing the homeland security problem: a collaborative decision-making framework
ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
A novel steganographic algorithm using animations as cover
Decision Support Systems
Using case-based reasoning for the design of controls for internet-based information systems
Expert Systems with Applications: An International Journal
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
An ensemble-based evolutionary framework for coping with distributed intrusion detection
Genetic Programming and Evolvable Machines
Theoretical results in genetic programming: the next ten years?
Genetic Programming and Evolvable Machines
Open issues in genetic programming
Genetic Programming and Evolvable Machines
Genetic programming needs better benchmarks
Proceedings of the 14th annual conference on Genetic and evolutionary computation
Hi-index | 0.00 |
Because malicious intrusions into critical information infrastructures are essential to the success of cyberterrorists, effective intrusion detection is also essential for defending such infrastructures. Cyberterrorism thrives on the development of new technologies; and, in response, intrusion detection methods must be robust and adaptive, as well as efficient. We hypothesize that genetic programming algorithms can aid in this endeavor. To investigate this proposition, we conducted an experiment using a very large dataset from the 1999 Knowledge Discovery in Database (KDD) Cup data, supplied by the Defense Advanced Research Projects Agency (DARPA) and MIT's Lincoln Laboratories. Using machine-coded linear genomes and a homologous crossover operator in genetic programming, promising results were achieved in detecting malicious intrusions. The resulting programs execute in real time, and high levels of accuracy were realized in identifying both positive and negative instances.