Survey:: Using genetic algorithm approach in intrusion detection systems techniques

被引:20
作者
Owais, Suhail [1 ]
Snasel, Vaclav [2 ]
Kroemer, Pavel [2 ]
Abraham, Ajith [3 ]
机构
[1] Al Balqa Appl Univ, Ajloun, Jordan
[2] VSB Tech Univ Ostrava, Ostrava, Czech Republic
[3] Norwegian Univ Sci & Technol, Trondheim, Norway
来源
SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT APPLICATIONS, PROCEEDINGS | 2008年
关键词
D O I
10.1109/CISIM.2008.49
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The wide spread use of computer networks in today's society, especially the sudden surge in importance of the World Wide Web, has made computer network security an international priority. Since it is not technically feasible to build a system with no vulnerabilities, intrusion detection (ID) has become an important area for researches. An intrusion that deviates only slightly from a pattern derived from the audit data may not be defected or a small change in normal behavior may cause a wrong data. Intrusion detection systems (IDS) offer techniques for modeling and recognizing normal and abusive system behavior. GAs can be successfully used to tune the membership functions used by the IDS. In this paper a survey were performed approaches based on IDS, and on implementing of GAs (GAs) on IDS.
引用
收藏
页码:300 / +
页数:2
相关论文
共 26 条
[1]  
Abraham A, 2006, STUD COMP INTELL, V13, P57
[2]  
ABRAHAM A, 2004, EVOLUTIONARY COMPUTI, P189
[3]  
ALEKSANDAR L, 2005, MASSIVE COMPUTING MA, pCH2
[4]  
[Anonymous], 2000, 9915 CHALM U DEP COM
[5]  
BACE R, 2001, INSTRUSION DETECTION
[6]   Hybrid flexible neural-tree-based intrusion detection systems [J].
Chen, Yuehui ;
Akbraham, Ajith ;
Yang, Bo .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2007, 22 (04) :337-352
[7]  
CHITTUR A, 2001, MODEL GENERATION INT
[8]  
DIAZGOMEZ PA, 2006, 6 NAT COMP INF SEC C
[9]  
DONG SK, 2005, GENETIC ALGORITHM IM
[10]  
Gong R. H., 2005, SOFTWARE IMPLEMENTAT