2011
DOI: 10.1016/j.cose.2011.08.009
|View full text |Cite
|
Sign up to set email alerts
|

Swarm intelligence in intrusion detection: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
108
0
4

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 192 publications
(112 citation statements)
references
References 57 publications
0
108
0
4
Order By: Relevance
“…SI first inaugurated by Beni [4] in cellular robotics system. Researchers are attracted with the behavior of flocks of social insects from many years.…”
Section: Introductionmentioning
confidence: 99%
“…SI first inaugurated by Beni [4] in cellular robotics system. Researchers are attracted with the behavior of flocks of social insects from many years.…”
Section: Introductionmentioning
confidence: 99%
“…In order to disarm DoS/DDoS attacks and any deviation, not only the detection of the malevolent behavior must be achieved, but the network traffic belonging to the attackers should be also blocked [23,24,25]. Thus, a predictor (detector) should take an appropriate action to thwart the attacks and should be able to adjust itself to the changing dynamics of the anomalies/attacks [20,26].…”
Section: Introductionmentioning
confidence: 99%
“…The exact difference is, Data Mining-based approaches are found on predicting unknown patterns and knowledge discovery of Databases, whereas, Machine Learning-based approaches are found on predicting 'known' patterns and also represent a Pre-Process step with an intent to improve the learner efficiency. Later, Evolutionary Detection methodologies [6] are developed based on real behavior of mammals, insects and species hunting the prey. For example, the prompt of Ant Colony Optimization algorithm was designed based on the real attitude of ants moving towards the prey.…”
Section: Introductionmentioning
confidence: 99%