9. Evolutionary Computation in Intelligent Network Management
نویسنده
چکیده
Data mining is an iterative and interactive process concerned with discovering patterns, associations and periodicity in real world data. This chapter presents two real world applications where evolutionary computation has been used to solve network management problems. First, we investigate the suitability of linear genetic programming (LGP) technique to model fast and efficient intrusion detection systems, while comparing its performance with artificial neural networks and classification and regression trees. Second, we use evolutionary algorithms for a Web usage-mining problem. Web usage mining attempts to discover useful knowledge from the secondary data obtained from the interactions of the users with the Web. Evolutionary algorithm is used to optimize the concurrent architecture of a fuzzy clustering algorithm (to discover data clusters) and a fuzzy inference system to analyze the trends. Empirical results clearly shows that evolutionary algorithm could play a major rule for the problems considered and hence an important data mining tool. 9.1 Intrusion Detection Systems Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. There are two types of intruders: the external intruders who are unauthorized users of the machines they attack, and internal intruders, who have permission to access the system with some restrictions. The traditional prevention techniques such as user authentication, data encryption, avoiding programming errors and firewalls are used as the first line of defense for computer security. If a password is weak and is compromised, user authentication cannot prevent unauthorized use, firewalls are vulnerable to errors in configuration and ambiguous or undefined security policies. They are generally unable to protect against malicious mobile code, insider attacks and unsecured modems. Programming errors cannot be avoided as the complexity of the system and application software is changing rapidly leaving behind some exploitable weaknesses. Intrusion detection is therefore required as an additional wall for protecting systems [9.10, 9.151. Intrusion detection is use-
منابع مشابه
Optimal intelligent control for glucose regulation
This paper introduces a novel control methodology based on fuzzy controller for a glucose-insulin regulatory system of type I diabetes patient. First, in order to incorporate knowledge about patient treatment, a fuzzy logic controller is employed for regulating the gains of the basis Proportional-Integral (PI) as a self-tuning controller. Then, to overcome the key drawback of fuzzy logic contro...
متن کاملUsing of Metaheuristic Water Cycle Algorithm in order to Determine Optimal Crop Cultivation across of Genetic Algorithm and linear programming (Case Study: Varamin Irrigation Network)
Due to water use increasing, attention to optimal water resources allocation is needed. In recent decades, the use of intelligent evolutionary methods for optimization of water allocation was focused more by researchers. The aim of this study is to development on water resources planning model that determined the proper cultivation, optimal exploitation of groundwater and surface water resource...
متن کاملReduction in the Transient Time of Shunt Active Filters Using Intelligent Controllers
This paper deals with the implementation of new proposed strategy for the reduction in the transient time of shunt active filter using intelligent controllers. Intelligent control is a class of control techniques that use various AI computing approaches like fuzzy logic, neural network, evolutionary computation, genetic algorithm etc. The proposed strategy works on the principle of energy of th...
متن کاملR&D Trends on Intelligent Systems and MIQ as A Performance Measure
This paper gives a survey of the past and present research and development activities in the field of intelligent systems. The intelligent system techniques included in this survey are fuzzy logic, neural networks, evolutionary computation, artificial intelligence, and expert systems. It lays emphasis on statistical trends of published papers, patents, and commercialized products. The paper als...
متن کاملEvolutionary neural networks for practical applications
Evolutionary neural networks (ENN) combine the evolutionary computation and neural networks to solve many interesting problems [11]. It automatically determines the weights and the topology of neural networks simultaneously and minimizes the intervention of human experts. It is a quite attractive technology for optimization, learning, and control of intelligent systems and there have been a lot...
متن کامل