Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection

作者: Zorana Banković , Slobodan Bojanić , Octavio Nieto-Taladriz

DOI: 10.1007/978-3-540-88181-0_19

关键词:

摘要: The paper presents a serial combination of two genetic algorithm-based intrusion detection systems. Feature extraction techniques are deployed in order to reduce the amount data that system needs process. designed is simple enough not introduce significant computational overhead, but at same time accurate, adaptive and fast. There large number existing solutions based on machine learning techniques, most them high overhead. Moreover, due its inherent parallelism, our solution offers possibility implementation using reconfigurable hardware with cost much lower than one traditional model verified KDD99 benchmark dataset, generating competitive state-of-the-art.

参考文章(15)
Pavel Laskov, Patrick Düssel, Christin Schäfer, Konrad Rieck, Learning intrusion detection: supervised or unsupervised? international conference on image analysis and processing. pp. 50- 57 ,(2005) , 10.1007/11553595_6
Yacine Bouzida, Frédéric Cuppens, Detecting Known and Novel Network Intrusions information security conference. pp. 258- 270 ,(2006) , 10.1007/0-387-33406-8_22
Nitesh V. Chawla, Aleksandar Lazarevic, Lawrence O. Hall, Kevin W. Bowyer, SMOTEBoost: Improving Prediction of the Minority Class in Boosting european conference on principles of data mining and knowledge discovery. pp. 107- 119 ,(2003) , 10.1007/978-3-540-39804-2_12
I K Fodor, A Survey of Dimension Reduction Techniques Office of Scientific and Technical Information (OSTI). ,(2002) , 10.2172/15002155
Ren Hui Gong, M. Zulkernine, P. Abolmaesumi, A software implementation of a genetic algorithm based approach to network intrusion detection software engineering artificial intelligence networking and parallel distributed computing. pp. 246- 253 ,(2005) , 10.1109/SNPD-SAWN.2005.9
Gianluigi Folino, Clara Pizzuti, Giandomenico Spezzano, GP Ensemble for Distributed Intrusion Detection Systems Pattern Recognition and Data Mining. pp. 54- 62 ,(2005) , 10.1007/11551188_6
Gary M. Weiss, Mining with rarity ACM SIGKDD Explorations Newsletter. ,vol. 6, pp. 7- 19 ,(2004) , 10.1145/1007730.1007734
John McHugh, Testing Intrusion detection systems ACM Transactions on Information and System Security. ,vol. 3, pp. 262- 294 ,(2000) , 10.1145/382912.382923
Zorana Banković, Dušan Stepanović, Slobodan Bojanić, Octavio Nieto-Taladriz, Improving network security using genetic algorithm approach Computers & Electrical Engineering. ,vol. 33, pp. 438- 451 ,(2007) , 10.1016/J.COMPELECENG.2007.05.010
Jing T. Yao, Song L. Zhao, Larry V. Saxton, A study on fuzzy intrusion detection Data mining, intrusion detection, information assurance, and data networks security. Conference. ,vol. 5812, pp. 23- 30 ,(2005) , 10.1117/12.604465