2018
DOI: 10.1016/j.eswa.2017.09.013
|View full text |Cite
|
Sign up to set email alerts
|

Network Anomaly Detection System using Genetic Algorithm and Fuzzy Logic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
93
0
5

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 215 publications
(98 citation statements)
references
References 30 publications
0
93
0
5
Order By: Relevance
“…Another approach using genetic algorithms (GA) and fuzzy logic for network intrusion detection is presented by Hamamoto et al [27]. The GA is used to create a digital signature of a network segment using glow analysis (DSNSF), a prediction of the network's traffic behavior for a given time interval.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…Another approach using genetic algorithms (GA) and fuzzy logic for network intrusion detection is presented by Hamamoto et al [27]. The GA is used to create a digital signature of a network segment using glow analysis (DSNSF), a prediction of the network's traffic behavior for a given time interval.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…Fitness function is used to evaluate the quality if the generated candidate solutions. In this study, the proposed fitness function is given by the following formula [1]:…”
Section: Fitness Function Evaluationmentioning
confidence: 99%
“…In line with the development of communication technology, the data security in a computer system is now more vulnerable to threats that could be possibly misused for a wrong reason. In order to deal with this situation, a good and efficient mechanism must be developed and employed as a preemptive method to protect the valuable information available in a computer system [1][2][3][4]. The unauthorized access of sensitive information does not only occur externally from a network (Internet), but also internally (intranet).…”
Section: Introductionmentioning
confidence: 99%
“…In [21], the authors also used the concept of DSNSF to encapsulate six analyzed dimensions for each IP flow. The system monitors the network and extracts traffic characterization to the standard IPFIX form.…”
Section: Related Workmentioning
confidence: 99%