2012
DOI: 10.1007/978-3-642-31513-8_16
|View full text |Cite
|
Sign up to set email alerts
|

Composing Signatures for Misuse Intrusion Detection System Using Genetic Algorithm in an Offline Environment

Abstract: Abstract. In recent years Internet has experienced a rapid expansion and also facing increased no. of security threats. However many technological innovations have been proposed for information assurance but still protection of computer systems has been difficult. With the rapid growth of Internet technology, a high level of security is needed for keeping the data resources and equipments secure. In this context intrusion detection (ID) has become an important area of research since building a system with no v… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…The nodes use a dendrite cell algorithm to detect the intruder. In [2] a genetic algorithm based approach which uses a set of classification rules is presented. The classical rules are generated from a predefined network intrusion behavior.…”
Section: Related Workmentioning
confidence: 99%
“…The nodes use a dendrite cell algorithm to detect the intruder. In [2] a genetic algorithm based approach which uses a set of classification rules is presented. The classical rules are generated from a predefined network intrusion behavior.…”
Section: Related Workmentioning
confidence: 99%
“…A probabilistic classifier detects anomalies and a hidden Markov model narrows down attacker addresses [13]. Recently, genetic algorithms have been widely used in anomaly detection and misuse detection [14], [15]. Another recent development is using artificial immune systems (AIS) in intrusion detection [16].…”
Section: Related Researchmentioning
confidence: 99%
“…A probabilistic classifier detects anomalies and a hidden Markov model narrows down attacker addresses [8]. Recently genetic algorithms have been widely used in anomaly detection and misuse detection [9], [10]. Artificial immune systems have raised the interest of intrusion detection researchers [11].…”
Section: Anomaly-based Intrusion Detection Systemmentioning
confidence: 99%