Using Adaptive Mutation in a GA based Intrusion Detection
نویسندگان
چکیده
منابع مشابه
Escalate Intrusion Detection using GA - NN
Intrusion Detection systems are increasingly a key part of system defense. Various approaches to Intrusion Detection are currently being used but they are relatively ineffective. Among the several soft computing paradigms, we investigated genetic algorithms and neural networks to model fast and efficient Intrusion Detection Systems. With the feature selection process proposed it is possible to ...
متن کاملIntrusion Detection in IOT based Networks Using Double Discriminant Analysis
Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...
متن کاملGA-NIDS: A Genetic Algorithm based Network Intrusion Detection System
Detection of malicious connections in computer networks has been a growing problem motivating widespread research in computer science to develop better intrusion detecting systems (IDS). In this paper, we present a machine learning approach known as Genetic Algorithm (GA), to identify such harmful/attack type of connections. The algorithm takes into consideration different features in network c...
متن کاملNetwork Intrusion Detection Using PSO Based on Adaptive Mutation and Genetic Algorithm
The Particle Swarm Optimization is very efficient in intrusion detection in the networks. However, many intrusion detection systems either fail to detect or falsely detect the intrusions. This paper proposes a technique for intrusion detection using Particle Swarm Optimization with Genetic Algorithm based feature selection and using Adaptive Mutation for slow convergence of optimization algorit...
متن کاملAdaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller
The major work of intrusion detection systems is used to detect the anomaly and new attackers in the networks, even still various false alarms are caused in order to neglect this necessary feature. Existing system present an anomaly-based intrusion detection system to improve the system performance. Fuzzy rule-based modeling and fuzzy controller are used to create a detection model in the train...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2013
ISSN: 0975-8887
DOI: 10.5120/12724-9561