Evolutive modeling of TCP/IP network traffic for intrusion detection

被引:0
作者
Neri, F [1 ]
机构
[1] Univ Piemonte Orientale, DSTA, I-15100 Alessandria, AL, Italy
来源
REAL-WORLD APPLICATIONS OF EVOLUTIONARY COMPUTING, PROCEEDINGS | 2000年 / 1803卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The detection of intrusions over computer networks can be cast to the task of detecting anomalous patterns of network traffic. In this case, patterns of normal traffic have to be determined and compared against the current network traffic. Data mining systems based on Genetic Algorithms can contribute powerful search techniques for the acquisition of patterns of the network traffic from the large amount of data made available by audit tools. In this paper vee compare models of data traffic acquired by a system based on a distributed genetic algorithm with the ones acquired by a system based on greedy heuristics. Also Re discuss representation change of the network data and its impact over the performances of the traffic models.
引用
收藏
页码:214 / 223
页数:10
相关论文
共 14 条
  • [1] [Anonymous], 1989, GENETIC ALGORITHM SE
  • [2] [Anonymous], 6 INT C GEN ALG ICG
  • [3] COHEN W, 1995, P INT MACH LEARN C 1
  • [4] AN INTRUSION-DETECTION MODEL
    DENNING, DE
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232
  • [5] GHOSH A, 1999, USENIX WORKSH INTR D
  • [6] Search-Intensive Concept Induction
    Giordana, Attilio
    Neri, Filippo
    [J]. EVOLUTIONARY COMPUTATION, 1995, 3 (04) : 375 - 416
  • [7] KUMAR S, 1994, NATL COMPUTER SECURI, P11
  • [8] LANE T, 1997, NATL INFORMATION SYS
  • [9] LANE T, 1998, 9812 TR PURD U
  • [10] Lee W., 1999, P 5 ACM SIGKDD INT C, DOI DOI 10.1145/312129.312212