Bio-Inspired Computation in Telecommunications 2015
DOI: 10.1016/b978-0-12-801538-4.00004-5
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Intrusion Detection Systems Using Evolutionary Computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 35 publications
(10 citation statements)
references
References 47 publications
0
9
0
1
Order By: Relevance
“…Evolutionary computation (EC) is one of the most promising approaches in intrusion detection. A recent survey [49] showed that evolutionary computation techniques allow to obtain more readable outputs by security experts, lightweight solutions using fewer features, and a set of solutions providing different trade-offs between conflict objectives. Furthermore, EC provides ease of representation, and it does not require assumptions about the solution space [60].…”
Section: The Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Evolutionary computation (EC) is one of the most promising approaches in intrusion detection. A recent survey [49] showed that evolutionary computation techniques allow to obtain more readable outputs by security experts, lightweight solutions using fewer features, and a set of solutions providing different trade-offs between conflict objectives. Furthermore, EC provides ease of representation, and it does not require assumptions about the solution space [60].…”
Section: The Modelmentioning
confidence: 99%
“…The evolutionary computation techniques are mainly applied to intrusion detection in the security domain [48] [49]. Most of these studies focus on developing effective and efficient detection methods.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly to natural evolution, the optimization process consists of choosing amongst a set of solutions -the population -the fittest ones to breed or to continue into a newer set of solutions, which constitutes a new generation. This process is repeated until a certain convergence criteria is reached, which can be set as a minimum performance required from the individuals or a maximum number of generations reached during execution [9] (Figure 1). 1) Fitness Function: The process of selecting the best individuals from a given generation is done by evaluating each one of them using a fitness function, which can be described as a way of measuring how good the solutions presented are at solving the given problem [10].…”
Section: A Genetic Algorithmsmentioning
confidence: 99%
“…The traffic information is moved in bulk and then analyzed for any unusual behavior in the data. The team explores threats by using known attack signatures, as well as trends [1][2][3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%