[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/11551188_6guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

GP ensemble for distributed intrusion detection systems

Published: 22 August 2005 Publication History

Abstract

In this paper an intrusion detection algorithm based on GP ensembles is proposed. The algorithm runs on a distributed hybrid multi-island model-based environment to monitor security-related activity within a network. Each island contains a cellular genetic program whose aim is to generate a decision-tree predictor, trained on the local data stored in the node. Every genetic program operates cooperatively, yet independently by the others, by taking advantage of the cellular model to exchange the outmost individuals of the population. After the classifiers are computed, they are collected to form the GP ensemble. Experiments on the KDD Cup 1999 Data show the validity of the approach.

References

[1]
The third international knowledge discovery and data mining tools competition dataset kdd99-cup. In http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, 1999.
[2]
E. Alba and M. Tomassini. Parallelism and evolutionary algorithms. IEEE Transaction on Evolutionary Computation, 6(5):443-462, October 2002.
[3]
A. P. Bradley. The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recognition, 30(7):1145-1159, 1997.
[4]
Leo Breiman. Bagging predictors. Machine Learning, 24(2):123-140, 1996.
[5]
G. Folino, C. Pizzuti, and G. Spezzano. A cellular genetic programming approach to classification. In Proc. Of the Genetic and Evolutionary Computation Conference GECCO99, pages 1015-1020, Orlando, Florida, July 1999. Morgan Kaufmann.
[6]
G. Folino, C. Pizzuti, and G. Spezzano. A scalable cellular implementation of parallel genetic programming. IEEE Transaction on Evolutionary Computation, 7(1):37-53, February 2003.
[7]
Y. Freund and R. Schapire. Experiments with a new boosting algorithm. In Proceedings of the 13th Int. Conference on Machine Learning, pages 148-156, 1996.
[8]
Wei Lu and Issa Traore. Detecting new forms of network intrusion using genetic programming. In Proc. of the Congress on Evolutionary Computation CEC'2003, pages 2165-2173. IEEE Press, 2003.
[9]
Srinivas Mukkamala, Andrew H. Sung, and Ajith Abraham. Modeling intrusion detection systems using linear genetic programming approach. In 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2004, pages 633-642, Ottawa, Canada, 2004.
[10]
J. Ross Quinlan. Bagging, boosting, and c4.5. In Proceedings of the 13th National Conference on Artificial Intelligence AAAI96, pages 725-730. Mit Press, 1996.
[11]
D. Song, M.I. Heywood, and A. Nur Zincir-Heywood. A linear genetic programming approach to intrusion detection. In Proceedings Of the Genetic and Evolutionary Computation Conference GECCO 2003, pages 2325-2336. LNCS 2724, Springer, 2003.

Cited By

View all
  • (2022)Evolutionary computation and machine learning in securityProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3520304.3534087(1572-1601)Online publication date: 9-Jul-2022
  • (2021)Evolutionary computation and machine learning in cryptologyProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3449726.3461420(1089-1118)Online publication date: 7-Jul-2021
  • (2018)Bio-inspired approaches to anomaly and intrusion detectionProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3205651.3207853(1121-1137)Online publication date: 6-Jul-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ICAPR'05: Proceedings of the Third international conference on Advances in Pattern Recognition - Volume Part I
August 2005
688 pages
ISBN:3540287574
  • Editors:
  • Sameer Singh,
  • Maneesha Singh,
  • Chid Apte,
  • Petra Perner

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 22 August 2005

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Evolutionary computation and machine learning in securityProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3520304.3534087(1572-1601)Online publication date: 9-Jul-2022
  • (2021)Evolutionary computation and machine learning in cryptologyProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3449726.3461420(1089-1118)Online publication date: 7-Jul-2021
  • (2018)Bio-inspired approaches to anomaly and intrusion detectionProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3205651.3207853(1121-1137)Online publication date: 6-Jul-2018
  • (2018)Comparison of ensemble learning methods for creating ensembles of dispatching rules for the unrelated machines environmentGenetic Programming and Evolvable Machines10.1007/s10710-017-9302-319:1-2(53-92)Online publication date: 1-Jun-2018
  • (2015)Ensemble Learning for Low-Level Hardware-Supported Malware DetectionProceedings of the 18th International Symposium on Research in Attacks, Intrusions, and Defenses - Volume 940410.1007/978-3-319-26362-5_1(3-25)Online publication date: 2-Nov-2015
  • (2014)A variable size mechanism of distributed graph programs and its performance evaluation in agent control problemsExpert Systems with Applications: An International Journal10.1016/j.eswa.2013.08.06341:4(1663-1671)Online publication date: 1-Mar-2014
  • (2012)Evaluation of classification algorithms for intrusion detection in MANETsKnowledge-Based Systems10.1016/j.knosys.2012.06.01636(217-225)Online publication date: 1-Dec-2012
  • (2010)ReviewApplied Soft Computing10.1016/j.asoc.2009.06.01910:1(1-35)Online publication date: 1-Jan-2010
  • (2010)An ensemble-based evolutionary framework for coping with distributed intrusion detectionGenetic Programming and Evolvable Machines10.1007/s10710-010-9101-611:2(131-146)Online publication date: 1-Jun-2010
  • (2007)A distributed hebb neural network for network anomaly detectionProceedings of the 5th international conference on Parallel and Distributed Processing and Applications10.5555/2395970.2396004(314-325)Online publication date: 29-Aug-2007
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media