2020
DOI: 10.1016/j.swevo.2019.100631
|View full text |Cite
|
Sign up to set email alerts
|

Role of swarm and evolutionary algorithms for intrusion detection system: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 87 publications
(27 citation statements)
references
References 86 publications
0
26
0
1
Order By: Relevance
“…Machine learning-based IDSs can reach satisfactory detection levels, and machine learning models have sufficient generalizability to detect attack variants and novel threats. The promising research area in computer science, derived from SWEVO algorithms, is motivated by the natural evolution of biological organisms [15]. Many heuristic algorithms obtained from the natural behavior of biological or physical systems were suggested as robust methods for global optimization [16].…”
Section: Swarm Optimization Evolutionary Algorithms (Swevo) and Machine Learning Algorithms Machine Learning (Ml)mentioning
confidence: 99%
“…Machine learning-based IDSs can reach satisfactory detection levels, and machine learning models have sufficient generalizability to detect attack variants and novel threats. The promising research area in computer science, derived from SWEVO algorithms, is motivated by the natural evolution of biological organisms [15]. Many heuristic algorithms obtained from the natural behavior of biological or physical systems were suggested as robust methods for global optimization [16].…”
Section: Swarm Optimization Evolutionary Algorithms (Swevo) and Machine Learning Algorithms Machine Learning (Ml)mentioning
confidence: 99%
“…The huge amount of logging information generated by complex Big Data infrastructures is, without a doubt, a rich substrate for detecting, identifying and counteracting security threats. The self-organizing nature of bio-inspired computation can provide the required level of robustness and resilience against such threats, specially those inspired by artificial immune systems for authentication and access control systems [ 246 ], evolutionary algorithms as constituent parts of intrusion detection systems relying on predictive modeling [ 247 ], or swarm intelligence methods for forensic analysis [ 248 ]. The record of successes around the application of bio-inspired methods to the security of complex networked systems is a motivational evidence towards embracing them massively in the Big Data realm.…”
Section: Critical Analysis Open Challenges and Research Directionsmentioning
confidence: 99%
“…Her sınıfın testi için ayrı ayrı veri setleri oluşturmuşlardır. Thakkar ve Lohiya [12] saldırı tespit sistemleri için üretilen sığ ve derin makine öğrenmesi modellerinin performanslarını artırmak için kullanılan sürü ve evrimsel yöntemleri kullanan çalışmaları incelemişler ve sonuçları karşılaştırmalı olarak sunmuşlardır. Hosseini [13] gerçekleştirdiği çalışmada öznitelik seçimi için hem genetik algoritma hem de parçacık sürü optimizasyonunu kullanmıştır.…”
Section: Literatürdeki İlgili çAlışmalarunclassified