Comparing local search with respect to genetic evolution to detect intrusions in computer networks

作者: Filippo Neri , None

DOI: 10.1109/CEC.2000.870301

关键词: Network simulationNetwork traffic simulationTestbedIntrusion detection systemGenetic algorithmComputer scienceTraffic generation modelLocal search (optimization)Machine learningAccess networkComputer networkArtificial intelligenceData mining

摘要: The detection of intrusions over computer networks (i.e., network access by non-authorized users) can be cast to the task detecting anomalous patterns traffic. In this case, models normal traffic have determined and compared against current Data mining systems based on genetic algorithms contribute powerful search techniques for acquisition from large amount data made available audit tools. We compare acquired a system distributed algorithm with ones greedy heuristics. Also we provide an empirical proof that representation change result in significant increase classification performances models. Network Information Exploration Shootout project 1998 DARPA Intrusion Detection Evaluation been chosen as experimental testbed.

参考文章(14)
Terran Lane, Carla E Brodley, An Application of Machine Learning to Anomaly Detection ,(1999)
David J. Fried, Robert K. Cunningham, Richard Lippmann, Isaac Graf, Kris R. Kendall, Seth E. Webster, Marc A. Zissman, Results of the DARPA 1998 offline intrusion detection evaluation recent advances in intrusion detection. ,(1999)
John J. Grefenstette, Mitchell A. Potter, Kenneth A. De Jong, A Coevolutionary Approach to Learning Sequential Decision Rules international conference on genetic algorithms. pp. 366- 372 ,(1995)
Aaron Schwartzbard, Michael Schatz, Anup K. Ghosh, Learning program behavior profiles for intrusion detection ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1. pp. 6- 6 ,(1999)
William W. Cohen, Fast Effective Rule Induction Machine Learning Proceedings 1995. pp. 115- 123 ,(1995) , 10.1016/B978-1-55860-377-6.50023-2
Attilio Giordana, Filippo Neri, None, Search-intensive concept induction Evolutionary Computation. ,vol. 3, pp. 375- 416 ,(1995) , 10.1162/EVCO.1995.3.4.375
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok, Mining in a data-flow environment: experience in network intrusion detection knowledge discovery and data mining. pp. 114- 124 ,(1999) , 10.1145/312129.312212
Filippo Neri, Lorenza Saitta, None, Exploring the power of genetic search in learning symbolic classifiers IEEE Transactions on Pattern Analysis and Machine Intelligence. ,vol. 18, pp. 1135- 1141 ,(1996) , 10.1109/34.544085
J. Ross Quinlan, C4.5: Programs for Machine Learning ,(1992)
Anil Somayaji, Steven A. Hofmeyr, Thomas A. Longstaff, Stephanie Forrest, A sense of self for Unix processes ieee symposium on security and privacy. pp. 120- 128 ,(1996) , 10.5555/525080.884258