[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Review: The use of computational intelligence in intrusion detection systems: A review

Published: 01 January 2010 Publication History

Abstract

Intrusion detection based upon computational intelligence is currently attracting considerable interest from the research community. Characteristics of computational intelligence (CI) systems, such as adaptation, fault tolerance, high computational speed and error resilience in the face of noisy information, fit the requirements of building a good intrusion detection model. Here we want to provide an overview of the research progress in applying CI methods to the problem of intrusion detection. The scope of this review will encompass core methods of CI, including artificial neural networks, fuzzy systems, evolutionary computation, artificial immune systems, swarm intelligence, and soft computing. The research contributions in each field are systematically summarized and compared, allowing us to clearly define existing research challenges, and to highlight promising new research directions. The findings of this review should provide useful insights into the current IDS literature and be a good source for anyone who is interested in the application of CI approaches to IDSs or related fields.

References

[1]
Danger Theory Project Website. Retrieved January 26, 2008, from http://www.dangertheory.com/.
[2]
The DARPA-Lincoln Dataset. Retrieved January 26, 2008, from http://www.ll.mit.edu/IST/ideval/data/data_index.html.
[3]
The Internet Exploration Shootout Dataset. Retrieved January 26, 2008, from http://ivpr.cs.uml.edu/shootout/network.html.
[4]
The KDD99 Dataset. Retrieved January 26, 2008, from http://kdd.ics.uci.edu/databases/kddcup99/task.html.
[5]
The New Mexico Dataset. Retrieved January 26, 2008, from http://www.cs.unm.edu/~immsec/systemcalls.htm.
[6]
The Unix User Dataset. Retrieved January 26, 2008, from http://kdd.ics.uci.edu/databases/UNIX_user_data/UNIX_user_data.html.
[7]
Wikipedia. Retrieved January 26, 2008, from http://en.wikipedia.org/.
[8]
Abadeh, M.S. and Habibi, J., Computer intrusion detection using an iterative fuzzy rule learning approach. In: IEEE International Conference on Fuzzy Systems (FUZZ-IEEE'07), IEEE Press. pp. 1-6.
[9]
Abadeh, M.S., Habibi, J. and Aliari, S., Using a particle swarm optimization approach for evolutionary fuzzy rule learning: a case study of intrusion detection. In: Information Processing and Management of Uncertainty in Knowledge-based Systems (IPMU'06),
[10]
Abadeh, M.S., Habibi, J., Barzegar, Z. and Sergi, M., A parallel genetic local search algorithm for intrusion detection in computer networks. Engineering Applications of Artificial Intelligence. v20 i8. 1058-1069.
[11]
Abadeh, M.S., Habibi, J. and Lucas, C., Intrusion detection using a fuzzy genetics-based learning algorithm. Journal of Network and Computer Applications. v30 i1. 414-428.
[12]
Abraham, A. and Grosan, C., Evolving intrusion detection systems. In: Nedjah, N., Abraham, A., de Macedo Mourelle, L. (Eds.), Genetic Systems Programming, volume 13 of Studies in Computational Intelligence, Springer, Berlin/Heidelberg. pp. 57-79.
[13]
Abraham, A., Grosan, C. and Martin-Vide, C., Evolutionary design of intrusion detection programs. International Journal of Network Security. v4 i3. 328-339.
[14]
Abraham, A. and Jain, R., Soft computing models for network intrusion detection systems. In: Halgamuge, S.K., Wang, L. (Eds.), Classification and Clustering for Knowledge Discovery, volume 4 of Studies in Computational Intelligence, Springer, Berlin/ Heidelberg. pp. 191-207.
[15]
Abraham, A., Jain, R., Thomas, J. and Han, S.Y., D-SCIDS: distributed soft computing intrusion detection system. Journal of Network and Computer Applications. v30 i1. 81-98.
[16]
Abraham, A. and Thomas, J., Distributed intrusion detection systems: a computational intelligence approach. In: Abbass, H., Essam, D. (Eds.), Applications of Information Systems to Homeland Security and Defense, Idea Group Inc., USA. pp. 105-135.
[17]
Aickelin, U., Bentley, P., Cayzer, S., Kim, J. and McLeod, J., Danger theory: The link between AIS and IDS?. In: Timmis, J., Bentley, P.J., Hart, E. (Eds.), Artificial Immune Systems, volume 2787 of Lecture Notes in Computer Science, Springer, Berlin/ Heidelberg. pp. 147-155.
[18]
Aickelin, U. and Cayzer, S., The danger theory and its application to artificial immune systems. In: Timmis, J., Bentley, P.J. (Eds.), Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS'02), Unversity of Kent at Canterbury Printing Unit. pp. 141-148.
[19]
Aickelin, U. and Greensmith, J., Sensing danger: Innate immunology for intrusion detection. Information Security Technical Reports. v12 i4. 218-227.
[20]
Aickelin, U., Greensmith, J. and Twycross, J., Immune system approaches to intrusion detection: a review. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (Eds.), Artificial Immune Systems, volume 3239 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 316-329.
[21]
Al-Subaie, M. and Zulkernine, M., The power of temporal pattern processing in anomaly intrusion detection. In: IEEE International Conference on Communications (ICC'07), IEEE Press. pp. 1391-1398.
[22]
Alshammari, R., Sonamthiang, S., Teimouri, M. and Riordan, D., Using neuro-fuzzy approach to reduce false positive alerts. In: Fifth Annual Conference on Communication Networks and Services Research (CNSR'07), pp. 345-349.
[23]
Amini, M. and Jalili, R., Network-based intrusion detection using unsupervised adaptive resonance theory. In: Proceedings of the 4th Conference on Engineering of Intelligent Systems (EIS'04),
[24]
Amini, M., Jalili, R. and Shahriari, H.R., RT-UNNID: a practical solution to real-time network-based intrusion detection using unsupervised neural networks. Computers&Security. v25 i6. 459-468.
[25]
An, J., Yue, G., Yu, F. and Li, R., Intrusion detection based on fuzzy neural networks. In: Wang, J., Yi, Z., Zurada, J.M., Lu, B.-L., Yin, H. (Eds.), Advances in Neural Networks - Third International Symposium on Neural Networks (ISNN'06), volume 3973 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 231-239.
[26]
Anchor, K.P., Williams, P., Gunsch, G. and Lamont, G., The computer defense immune system: current and future research in intrusion detection. In: Fogel, D.B., El-Sharkawi, M.A., Yao, X., Greenwood, G., Iba, H., Marrow, P., Shackleton, M. (Eds.), Proceedings of the IEEE Congress on Evolutionary Computation (CEC'02), vol. 2, IEEE Press. pp. 1027-1032.
[27]
Ayara, M., Timmis, J., de Lemos, R., de Castro, L.N. and Duncan, R., Negative selection: how to generate detectors. In: Timmis, J., Bentley, P.J. (Eds.), Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS'02), University of Kent at Canterbury Printing Unit. pp. 89-98.
[28]
S. Balachandran, Multi-shaped detector generation using real-valued representation for anomaly detection, Master's Thesis, The University of Memphis, Memphis, TN, December 2005.
[29]
Balachandran, S., Dasgupta, D., Niño, F. and Garrett, D., A general framework for evolving multi-shaped detectors in negative selection. In: IEEE Symposium on Foundations of Computational Intelligence (FOCI'07), IEEE Computer Society. pp. 401-408.
[30]
Balachandran, S., Dasgupta, D. and Wang, L., A hybrid approach for misbehavior detection in wireless ad-hoc networks. In: Symposium on Information Assurance,
[31]
Balajinath, B. and Raghavan, S.V., Intrusion detection through learning behavior model. Computer Communications. v24 i12. 1202-1212.
[32]
Balthrop, J., Esponda, F., Forrest, S. and Glickman, M., Coverage and generalization in an artificial immune system. In: Langdon, W.B. (Ed.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO'02), Morgan Kaufmann. pp. 3-10.
[33]
Balthrop, J., Forrest, S. and Glickman, M.R., Revisiting LISYS: parameters and normal behavior. In: Fogel, D.B., El-Sharkawi, M.A., Yao, X., Greenwood, G., Iba, H., Marrow, P., Shackleton, M. (Eds.), Proceedings of the IEEE Congress on Evolutionary Computation (CEC'02), vol. 2, IEEE Press. pp. 1045-1050.
[34]
Banerjee, S., Grosan, C. and Abraham, A., IDEAS: intrusion detection based on emotional ants for sensors. In: Proceedings of 5th International Conference on Intelligent Systems Design and Applications (ISDA'05), IEEE Computer Society, Washington, DC, USA. pp. 344-349.
[35]
Banerjee, S., Grosan, C., Abraham, A. and Mahanti, P., Intrusion detection on sensor networks using emotional ants. International Journal of Applied Science and Computations. v12 i3. 152-173.
[36]
Bankovic, Z., Stepanovic, D., Bojanica, S. and Nieto-Taladriz, O., Improving network security using genetic algorithm approach. Computers&Electrical Engineering. v33 i5-6. 438-451.
[37]
Banzhaf, W., Nordin, P., Keller, R. and Francone, F., Genetic Programming-An Introduction. 1998. Academic Press/Morgan Kaufmann, San Francisco, CA.
[38]
Bentley, P.J., Greensmith, J. and Ujjin, S., Two ways to grow tissue for artificial immune systems. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J. (Eds.), Artificial Immune Systems, volume 3627 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 139-152.
[39]
Bezdek, J.C., What is Computational Intelligence? Computational Intelligence Imitating Life. In: IEEE Press, New York. pp. 1-12.
[40]
Bivens, A., Palagiri, C., Smith, R., Szymanski, B. and Embrechts, M., Networkbased intrusion detection using neural networks. Intelligent Engineering Systems through Artificial Neural Networks. v12 i1. 579-584.
[41]
Brameier, M. and Banzhaf, W., Linear Genetic Programming. 2007. Springer, New York.
[42]
Bridges, S.M. and Vaughn, R.B., Fuzzy data mining and genetic algorithms applied to intrusion detection. In: Proceedings of the 23rd National Information Systems Security Conference, pp. 13-31.
[43]
Bridges, S.M. and Vaughn, R.B., Intrusion detection via fuzzy data mining. In: Proceedings of the 12th Annual Canadian Information Technology Security Symposium, pp. 111-121.
[44]
S.T. Brugger, The quantitative comparison of ip networks. Technical report, University of California, Davis, 2007. Retrieved January 26, 2008, from http://bruggerink.com/zow/GradSchool/brugger_netcompare_thesis.pdf.
[45]
T. Brugger, KDD cup'99 dataset (network intrusion) considered harmful, 15 September 2007. Retrieved January 26, 2008, from http://www.kdnuggets.com/news/2007/n18/4i.html.
[46]
Cannady, J., Artificial neural networks for misuse detection. In: Proceedings of the 21st National Information Systems Security Conference, pp. 368-381.
[47]
Cannady, J., Applying CMAC-based on-line learning to intrusion detection. In: Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN'00), vol. 5, IEEE Press. pp. 405-410.
[48]
Cannady, J., Next generation intrusion detection: autonomous reinforcement learning of network attacks. In: Proceedings of the 23rd National Information Systems Security Conference, pp. 1-12.
[49]
Cannady, J. and Mahaffey, J., The application of artificial neural networks to misuse detection: initial results. In: Proceedings of the 1st International Workshop on Recent Advances in Intrusion Detection (RAID 98),
[50]
Cayzer, S. and Smith, J., Gene libraries: Coverage, efficiency and diversity. In: Bersini, H., Carneiro, J. (Eds.), Artificial Immune Systems, volume 4163 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 136-149.
[51]
Cayzer, S., Smith, J., Marshall, J.A. and Kovacs, T., What have gene libraries done for AIS?. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J. (Eds.), Artificial Immune Systems, volume 3627 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 86-99.
[52]
Chan, A.P.F., Ng, W.W.Y., Yeung, D.S. and Tsang, E.C.C., Comparison of different fusion approaches for network intrusion detection using ensemble of RBFNN. In: Proceedings of 2005 International Conference on Machine Learning and Cybernetics, vol. 6, IEEE Press. pp. 3846-3851.
[53]
Chavan, S., Shah, K., Dave, N., Mukherjee, S., Abraham, A. and Sanyal, S., Adaptive neuro-fuzzy intrusion detection systems. In: IEEE International Conference on Information Technology: Coding and Computing (ITCC'04), vol. 1, IEEE Computer Society. pp. 70-74.
[54]
Chebrolu, S., Abraham, A. and Thomas, J.P., Feature deduction and ensemble design of intrusion detection systems. Computers&Security. v24 i4. 295-307.
[55]
Chen, G., Chen, Q. and Guo, W., A PSO-based approach to rule learning in network intrusion detection. In: Cao, B.-Y. (Ed.), Fuzzy Information and Engineering, volume 40 of Advances in Soft Computing, Springer, Berlin/Heidelberg. pp. 666-673.
[56]
Chen, Y., Zhou, J. and Abraham, A., Estimation of distribution algorithm for optimization of neural networks for intrusion detection system. In: Rutkowski, L., Tadeusiewicz, R., Zadeh, L.A., Zurada, J. (Eds.), The 8th International Conference on Artificial Intelligence and Soft Computing (ICAISC'06), volume 4029 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 9-18.
[57]
Cheng, E., Jin, H., Han, Z. and Sun, J., Network-based anomaly detection using an elman network. In: Lu, X., Zhao, W. (Eds.), Networking and Mobile Computing, volume 3619 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 471-480.
[58]
Chimphlee, W., Abdullah, A.H., Sap, M.N.M., Chimphlee, S. and Srinoy, S., Unsupervised clustering methods for identifying rare events in anomaly detection. In: 6th Internation Enformatika Conference (IEC'05), pp. 26-28.
[59]
Chimphlee, W., Abdullah, A.H., Sap, M.N.M., Srinoy, S. and Chimphlee, S., Anomaly-based intrusion detection using fuzzy rough clustering. In: International Conference on Hybrid Information Technology (ICHIT'06), vol. 1, pp. 329-334.
[60]
Chimphlee, W., Sap, M.N.M., Abdullah, A.H., Chimphlee, S. and Srinoy, S., To identify suspicious activity in anomaly detection based on soft computing. In: Proceedings of the 24th IASTED International Conference on Artificial Intelligence and Applications, pp. 359-364.
[61]
A. Chittur, Model generation for an intrusion detection system using genetic algorithms. Technical report, High School Honors Thesis, Ossining High School. In cooperation with Columbia Univ., 2002.
[62]
Cho, S.-B., Incorporating soft computing techniques into a probabilistic intrusion detection system. IEEE Transactions on Systems, Man and Cybernetics: Part C: Applications and Reviews. v32 i2. 154-160.
[63]
Craenen, B. and Eiben, A., Computational intelligence. Encyclopedia of Life Support Sciences. 2002. EOLSS Co. Ltd.
[64]
Crosbie, M. and Spafford, E.H., Applying genetic programming to intrusion detection. In: Siegel, E.V., Koza, J.R. (Eds.), Working Notes for the AAAI Symposium on Genetic Programming, AAAI. pp. 1-8.
[65]
Dam, H.H., Shafi, K. and Abbass, H.A., Can evolutionary computation handle large dataset?. In: Zhang, S., Jarvis, R. (Eds.), AI 2005: Advances in Artificial Intelligence-18th Australian Joint Conference on Artificial Intelligence, Springer, Berlin/Heidelberg. pp. 1092-1095.
[66]
Dasgupta, D., Immunity-based intrusion detection system: a general framework. In: Proceedings of the 22nd National Information Systems Security Conference, pp. 147-160.
[67]
Dasgupta, D., Advances in artificial immune systems. IEEE Computational Intelligence Magazine. v1 i4. 40-49.
[68]
Dasgupta, D. and Gonzalez, F., An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation. v6 i3. 281-291.
[69]
Dasgupta, D., Yu, S. and Majumdar, N., MILA-multilevel immune learning algorithm and its application to anomaly detection. Soft Computing Journal. v9 i3. 172-184.
[70]
Dass, M., LIDS: A Learning Intrusion Detection System. Master of Science. 2003. The University of Georgia, Athens, Georgia.
[71]
de Castro, L.N., Immune, swarm, and evolutionary algorithms. Part II. Philosophical comparisons. In: Wang, L., Rajapakse, J.C., Fukushima, K., Lee, S.-Y., Yao, X. (Eds.), Proceedings of the International Conference on Neural Information Processing (ICONIP'02), Workshop on Artificial Immune Systems, vol. 3, IEEE Press. pp. 1469-1473.
[72]
de Castro, L.N. and Timmis, J.I., An artificial immune network for multimodal function optimization. In: Fogel, D.B., El-Sharkawi, M.A., Yao, X., Greenwood, G., Iba, H., Marrow, P., Shackleton, M. (Eds.), Proceedings of the IEEE Congress on Evolutionary Computation (CEC'02), vol. 1, IEEE Press, Honolulu, HI, USA, 12-17 May. pp. 674-699.
[73]
de Castro, L.N. and Timmis, J.I., Artificial immune systems as a novel soft computing paradigm. Soft Computing. v7 i8. 526-544.
[74]
L.N. de Castro, F.J.V. Zuben, Artificial immune systems. Part I. Basic theory and applications. Technical Report TR - DCA 01/99, The Catholic University of Santos, Brazil, December 1999.
[75]
de Castro, L.N. and Zuben, F.J.V., Learning and optimization using the clonal selection principle. IEEE Transactions on Evolutionary Computation. v6 i3. 239-251.
[76]
Debar, H., Becker, M. and Siboni, D., A neural network component for an intrusion detection system. In: Proceedings of 1992 IEEE Computer Society Symposium on Research in Security and Privacy, IEEE Press. pp. 240-250.
[77]
Debar, H., Dacier, M. and Wespi, A., Towards a taxonomy of intrusion-detection systems. Computer Networks. v31 i8. 805-822.
[78]
Debar, H. and Dorizzi, B., An application of a recurrent network to an intrusion detection system. In: Proceeding of the International Joint Conference on Neural Networks (IJCNN 92), vol. 2, pp. 478-483.
[79]
Deneubourg, J., Goss, S., Franks, N., Sendova-Franks, A., Detrain, C. and Chretien, L., The dynamics of collective sorting: robot-like ants and ant-like robots. In: Meyer, J.A., Wilson, S. (Eds.), Proceedings of the First International Conference on Simulation of Adaptive Behaviour: From Animals to Animats, vol. 1, MIT Press, Cambridge, MA, USA. pp. 356-365.
[80]
Denning, D.E., An intrusion detection model. IEEE Transactions on Software Engineering. v13 i2. 222-232.
[81]
Dhaeseleer, P., Forrest, S. and Helman, P., An immunological approach to change detection: algorithms, analysis and implications. In: Proceedings of 1996 IEEE Symposium onSecurity and Privacy, IEEE Computer Society. pp. 110-119.
[82]
Diaz-Gomez, P.A. and Hougen, D.F., Analysis and mathematical justification of a fitness function used in an intrusion detection system. In: Beyer, H.-G., O'Reilly, U.-M. (Eds.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO'05), ACM. pp. 1591-1592.
[83]
Diaz-Gomez, P.A. and Hougen, D.F., Analysis of an off-line intrusion detection system: a case study in multi-objective genetic algorithms. In: Russell, I., Markov, Z. (Eds.), Proceedings of the Eighteenth International Florida Artificial Intelligence Research Society Conference, AAAI Press, Clearwater Beach, FL, USA. pp. 822-823.
[84]
Diaz-Gomez, P.A. and Hougen, D.F., Improved off-line intrusion detection using a genetic algorithm. In: Proceedings of the Seventh International Conference on Enterprise Information Systems, pp. 66-73.
[85]
Diaz-Gomez, P.A. and Hougen, D.F., A genetic algorithm approach for doing misuse detection in audit trail files. In: The 15th International Conference on Computing (CIC'06), IEEE Computer Society. pp. 329-338.
[86]
Dickerson, J.E. and Dickerson, J.A., Fuzzy network profiling for intrusion detection. In: Proceedings of the 19th International Conference of the North American Fuzzy Information Society (NAFIPS'00), IEEE Press. pp. 301-306.
[87]
Dickerson, J.E., Juslin, J., Koukousoula, O. and Dickerson, J.A., Fuzzy intrusion detection. In: Proceedings of the 20th International Conference of the North American Fuzzy Information Society (NAFIPS'01) and Joint the 9th IFSA World Congress, vol. 3, IEEE Press. pp. 1506-1510.
[88]
M. Dorigo, Optimization, learning and natural algorithms, PhD Thesis, Dipartimento di Elettronica, Politecnico di Milano, Italy, 1992 (in italian).
[89]
Duch, W., What is computational intelligence and where is it going?. In: Duch, W., Mańdziuk, J. (Eds.), Challenges for Computational Intelligence, volume 63 of Studies in Computational Intelligence, Springer, Berlin/Heidelberg. pp. 1-13.
[90]
N.A. Durgin, P. Zhang, Profile-based adaptive anomaly detection for network security. Technical report, Sandia National Laboratories, 2005.
[91]
El-Semary, A., Edmonds, J., Gonzalez, J. and Papa, M., A framework for hybrid fuzzy logic intrusion detection systems. In: The 14th IEEE International Conference on Fuzzy Systems (FUZZ'05), IEEE Press. pp. 325-330.
[92]
Elkan, C., Results of the KDD'99 classifier learning. ACM SIGKDD Explorations Newsletter. v1. 63-64.
[93]
Esponda, F., Forrest, S. and Helman, P., The crossover closure and partial match detection. In: Timmis, J., Bentley, P.J., Hart, E. (Eds.), Artificial Immune Systems, volume 2787 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 249-260.
[94]
Esponda, F., Forrest, S. and Helman, P., A formal framework for positive and negative detection schemes. IEEE Transactions on Systems, Man and Cybernetics - Part B: Cybernetics. v34 i1. 357-373.
[95]
Fan, W., Miller, M., Stolfo, S., Lee, W. and Chan, P., Using artificial anomalies to detect unknown and known network intrusions. Knowledge and Information Systems. v6 i5. 507-527.
[96]
Faraoun, K. and Boukelif, A., Genetic programming approach for multi-category pattern classification applied to network intrusions detection. International Journal of Computational Intelligence and Applications. v3 i1. 77-90.
[97]
Feng, Y., Wu, Z., Wu, K., Xiong, Z. and Zhou, Y., An unsupervised anomaly intrusion detection algorithm based on swarm intelligence. In: Proceedings of 2005 International Conference on Machine Learning and Cybernetics, vol. 7, pp. 3965-3969.
[98]
Feng, Y., Zhong, J., Xiong, Z., xiao Ye, C. and gui Wu, K., Network anomaly detection based on dsom and aco clustering. In: Liu, D., Fei, S., Hou, Z., Zhang, H., Sun, C. (Eds.), Advances in Neural Networks (ISNN 2007), volume 4492 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 947-955.
[99]
Feng, Y., Zhong, J., Ye, C. and Wu, Z., Clustering based on self-organizing ant colony networks with application to intrusion detection. In: Ceballos, S. (Ed.), Proceedings of 6th International Conference on Intelligent Systems Design and Applications (ISDA'06), vol. 6, IEEE Computer Society, Washington, DC, USA. pp. 3871-3875.
[100]
Ferreira, C., Gene expression programming: a new adaptive algorithm for solving problems. Complex Systems. v13 i2. 87-129.
[101]
Florez, G., Bridges, S.M. and Vaughn, R.B., An improved algorithm for fuzzy data mining for intrusion detection. In: Proceedings of the 21st International Conference of the North American Fuzzy Information Society (NAFIPS'02), IEEE Press. pp. 457-462.
[102]
Fogel, D.B., What is evolutionary computation?. IEEE Spectrum. v37 i2.
[103]
Folino, G., Pizzuti, C. and Spezzano, G., An evolutionary ensemble approach for distributed intrusion detection. In: International Conference on Artificial Evolution (EA'05),
[104]
Folino, G., Pizzuti, C. and Spezzano, G., GP ensemble for distributed intrusion detection systems. In: Singh, S., Singh, M., Apté, C., Perner, P. (Eds.), Pattern Recognition and Data Mining, Third International Conference on Advances in Pattern Recognition (ICAPR'05), Bath, UK, August 22-25, 2005. Proceedings, Part I, volume 3686 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 54-62.
[105]
Forrest, S. and Beauchemin, C., Computer immunology. Immunological Reviews. v216 i1. 176-197.
[106]
Forrest, S., Hofmeyr, S. and Somayaji, A., Computer immunology. Communications of the ACM. v40 i10. 88-96.
[107]
Forrest, S., Hofmeyr, S., Somayaji, A. and Longstaff, T., A sense of self for Unix processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, IEEE Computer Society Press. pp. 120-128.
[108]
Forrest, S., Perelson, A.S., Allen, L. and Cherukuri, R., Self-nonself discrimination in a computer. In: Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, IEEE Press. pp. 202-212.
[109]
Forrest, S., Smith, R., Javornik, B. and Perelson, A., Using genetic algorithms to explore pattern recognition in the immune system. Evolutionary Computation. v1 i3. 191-211.
[110]
Fox, K., Henning, R. and Reed, J., A neural network approach toward intrusion detection. In: Proceedings of the 13th National Computer Security Conference, vol. 1, pp. 124-134.
[111]
Freitas, A.A. and Timmis, J., Revisiting the foundations of artificial immune systems: A problem-oriented perspective. In: Timmis, J., Bentley, P.J., Hart, E. (Eds.), Artificial Immune Systems, volume 2787 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 229-241.
[112]
Galeano, J.C., Veloza-Suan, A. and González, F.A., A comparative analysis of artificial immune network models. In: Beyer, H.-G., O'Reilly, U.-M. (Eds.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO'05), pp. 361-368.
[113]
Garrett, S.M., How do we evaluate artificial immune systems?. Evolutionary Computation. v13 i2. 145-177.
[114]
Ghosh, A.K., Michael, C. and Schatz, M., A real-time intrusion detection system based on learning program behavior. In: Debar, H., Mé, L., Wu, S.F. (Eds.), Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection (RAID'00), Toulouse, France, 2-4 October, 2000, volume 1907 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 93-109.
[115]
Ghosh, A.K. and Schwartzbard, A., A study in using neural networks for anomaly and misuse detection. In: Proceedings of the 8th USENIX Security Symposium, vol. 8, pp. 141-152.
[116]
Ghosh, A.K., Wanken, J. and Charron, F., Detecting anomalous and unknown intrusions against programs. In: Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC'98), IEEE Computer Society. pp. 259-267.
[117]
Giordana, A., Neri, F. and Saitta, L., Search-intensive concept induction. Evolutionary Computation. v3 i4. 375-416.
[118]
Girardin, L., An eye on network intruder-administrator shootouts. In: Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring, USENIX Association, Berkeley, CA, USA. pp. 19-28.
[119]
Glickman, M., Balthrop, J. and Forrest, S., A machine learning evaluation of an artificial immune system. Evolutionary Computation. v13 i2. 179-212.
[120]
Gómez, J. and Dasgupta, D., Complete expression trees for evolving fuzzy classifier systems with genetic algorithms and application to network intrusion detection. In: Proceedings of the 21st International Conference of the North American Fuzzy Information Society (NAFIPS'02), IEEE Press. pp. 469-474.
[121]
Gómez, J. and Dasgupta, D., Evolving fuzzy classifiers for intrusion detection. In: Proceedings of the 2002 IEEE Workshop on Information Assurance, IEEE Press.
[122]
Gómez, J., GonzAlez, F. and Dasgupta, D., An immuno-fuzzy approach to anomaly detection. In: The 12th IEEE International Conference on Fuzzy Systems (FUZZ'03), vol. 2, IEEE Press. pp. 1219-1224.
[123]
Gong, M., Du, H., Jiao, L. and Wang, L., Immune clonal selection algorithm for multiuser detection in DS-CDMA systems. In: Webb, G.I., Yu, X. (Eds.), AI 2004: Advances in Artificial Intelligence, volume 3339 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 1219-1225.
[124]
Gong, R.H., Zulkernine, M. and Abolmaesumi, P., A software implementation of a genetic algorithm based approach to network intrusion detection. In: The Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2005 and the First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN'05), pp. 246-253.
[125]
F. González, A study of artificial immune systems applied to anomaly detection, PhD Thesis, The University of Memphis, 2003.
[126]
González, F. and Dasgupta, D., Anomaly detection using real-valued negative selection. Genetic Programming and Evolvable Machines. v4 i4. 383-403.
[127]
González, F., Dasgupta, D. and Gomez, J., The effect of binary matching rules in negative selection. In: C.-P., E. (Ed.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO'03), Part I, Chicago, IL, USA, 12-16 July, 2003, volume 2723 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 195-206.
[128]
González, F., Dasgupta, D. and Kozma, R., Combining negative selection and classification techniques for anomaly detection. In: Fogel, D.B., El-Sharkawi, M.A., Yao, X., Greenwood, G., Iba, H., Marrow, P., Shackleton, M. (Eds.), Proceedings of the IEEE Congress on Evolutionary Computation (CEC'02), vol. 1, IEEE Press. pp. 705-710.
[129]
González, F., Dasgupta, D. and Nino, L.F., A randomized real-valued negative selection algorithm. In: Timmis, J., Bentley, P.J., Hart, E. (Eds.), Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS'03), Edinburgh, UK, 1-3 September, 2003, volume 2787 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 261-272.
[130]
González, F., Gómez, J., Kaniganti, M. and Dasgupta, D., An evolutionary approach to generate fuzzy anomaly signatures. In: Proceedings of the 4th Annual IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, IEEE Press. pp. 251-259.
[131]
González, L.J. and Cannady, J., A self-adaptive negative selection approach for anomaly detection. In: Proceedings of the IEEE Congress on Evolutionary Computation (CEC'04), vol. 2, IEEE Press. pp. 1561-1568.
[132]
Greensmith, J. and Aickelin, U., Dendritic cells for real-time anomaly detection. In: Proceedings of the Workshop on Artificial Immune Systems and Immune System Modelling (AISB'06), pp. 7-8.
[133]
Greensmith, J. and Aickelin, U., Dendritic cells for syn scan detection. In: Lipson, H. (Ed.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO'07), pp. 49-56.
[134]
Greensmith, J., Aickelin, U. and Cayzer, S., Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J. (Eds.), Proceedings of the 4th International Conference on Artificial Immune Systems (ICARIS'05), Banff, Alberta, CA, 14-17 August 2005, volume 3627 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 153-167.
[135]
Greensmith, J., Aickelin, U. and Tedesco, G., Information fusion for anomaly detection with the dendritic cell algorithm. Information Fusion. v11 i1. 21-34.
[136]
Greensmith, J., Aickelin, U. and Twycross, J., Detecting danger: Applying a novel immunological concept to intrusion detection systems. In: 6th International Conference in Adaptive Computing in Design and Manufacture (ACDM'04),
[137]
Greensmith, J., Twycross, J. and Aickelin, U., Dendritic cells for anomaly detection. In: G.Y., G. (Ed.), Proceedings of the IEEE Congress on Evolutionary Computation (CEC'06), IEEE Press. pp. 664-671.
[138]
Grosan, C., Abraham, A. and Han, S.Y., Mepids: multi-expression programming for intrusion detection system. In: Mira, J., Alvarez, J. (Eds.), International Work-conference on the Interplay between Natural and Artificial Computation (IWINAC'05), volume 3562 of Lecture Notes in Computer Science, Springer Verlag, Germany/Spain. pp. 163-172.
[139]
Haag, C.R., Lamont, G.B., Williams, P.D. and Peterson, G.L., An artificial immune system-inspired multiobjective evolutionary algorithm with application to the detection of distributed computer network intrusions. In: Thierens, D. (Ed.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO'07), pp. 2717-2724.
[140]
Han, S.J. and Cho, S.B., Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Transactions on Systems, Man, and Cybernetics - Part B. v36 i3. 559-570.
[141]
Handl, J., Knowles, J. and Dorigo, M., Strategies for the increased robustness of ant-based clustering. In: Serugendo, G.D.M., Karageorgos, A., Rana, O.F., Zambonelli, F. (Eds.), Engineering Self-Organising Systems, volume 2977 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 90-104.
[142]
Hang, X. and Dai, H., Constructing detectors in schema complementary space for anomaly detection. In: D., K. (Ed.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO'04), Part I, Seattle, WA, USA, 26-30 June 2004, volume 3102 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 275-286.
[143]
Hang, X. and Dai, H., An extended negative selection algorithm for anomaly detection. In: Dai, H., Srikant, R., Zhang, C., Cercone, N. (Eds.), Advances in Knowledge Discovery and Data Mining, volume 3056 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 245-254.
[144]
Hang, X. and Dai, H., Applying both positive and negative selection to supervised learning for anomaly detection. In: Beyer, H.-G., O'Reilly, U.-M. (Eds.), Proceedings of the Genetic and Evolutionary Computation Conference (GECOO'05), pp. 345-352.
[145]
Hansen, J.V., Lowry, P.B., Meservy, R.D. and McDonald, D.M., Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection. Decision Support System. v43 i4. 1362-1374.
[146]
P.K. Harmer, A distributed agent architecture of a computer virus immune system, Master's Thesis, Air Force Institute of Technology, Air University, March 2000.
[147]
Harmer, P.K., Williams, P.D., Gunsch, G.H. and Lamont, G.B., An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation. v6 i3. 252-280.
[148]
He, H., Luo, X. and Liu, B., Detecting anomalous network traffic with combined fuzzy-based approaches. In: Huang, D.-S., Zhang, X.-P., Huang, G.-B. (Eds.), Advances in Intelligent Computing, volume 3645 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 433-442.
[149]
He, J., Long, D. and Chen, C., An improved ant-based classifier for intrusion detection. In: The 3nd International Conference on Natural Computation (ICNC'07), vol. 4, IEEE Press. pp. 819-823.
[150]
Hofmann, A., Schmitz, C. and Sick, B., Intrusion detection in computer networks with neural and fuzzy classifiers. In: Kaynak, O., Alpaydin, E., Oja, E., Xu, L. (Eds.), Artificial Neural Networks and Neural Information Processing (ICANN/ICONIP'03), volume 2714 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 316-324.
[151]
Hofmann, A., Schmitz, C. and Sick, B., Rule extraction from neural networks for intrusion detection in computer networks. In: IEEE International Conference on Systems, Man and Cybernetics, vol. 2, IEEE Press. pp. 1259-1265.
[152]
Hofmeyr, S. and Forrest, S., Immunity by design: an artificial immune system. In: Banzhaf, W., Daida, J., Eiben, A.E., Garzon, M.H., Honavar, V., Jakiela, M., Smith, R.E. (Eds.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 99), Morgan Kaufmann. pp. 1289-1296.
[153]
S.A. Hofmeyr, An immunological model of distributed detection and its application to computer security, PhD Thesis, The University of New Mexico, 1999.
[154]
Hoglund, A.J., Hatonen, K. and Sorvari, A.S., A computer host-based user anomaly detction system using the self-organizing map. In: Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN'00), vol. 5, IEEE Press. pp. 411-416.
[155]
Holland, J. and Reitman, J., Cognitive systems based on adaptive algorithms. In: Waterman, D., Hayes-Roth, F. (Eds.), Pattern-Directed Inference Systems, Academic Press, New York.
[156]
Holland, J.H., Adaptation in Natural and Artificial Systems. 1975. University of Michican Press, Cambridge, MA, USA.
[157]
Horn, J. and Goldberg, D.E., Natural niching for evolving cooperative classifiers. In: Koza, J.R., Goldberg, D.E., Fogel, D.B., Riolo, R.L. (Eds.), Proceedings of the 1st Annual Conference on Genetic Programming, The MIT Press. pp. 553-564.
[158]
Jerne, N., Towards a network theory of the immune system. Annals of Immunology (Paris). v125 i1-2. 373-389.
[159]
Ji, Z., A boundary-aware negative selection algorithm. In: del Pobil, A. (Ed.), Proceedings of the 9th IASTED International Conference on Artificial Intelligence and Soft Computing, ACTA Press. pp. 481-486.
[160]
Z. Ji, Negative selection algorithms: from the thymus to V-detector, PhD Thesis, Computer Science, The University of Memphis, August 2006.
[161]
Ji, Z. and Dasgupta, D., Artificial immune system (AIS) research in the last five years. In: Gedeon, T. (Ed.), Proceedings of the IEEE Congress on Evolutionary Computation (CEC'03), vol. 1, IEEE Press. pp. 123-130.
[162]
Ji, Z. and Dasgupta, D., Augmented negative selection algorithm with variable-coverage detectors. In: Proceedings of the IEEE Congress on Evolutionary Computation (CEC'04), vol. 1, IEEE Press. pp. 1081-1088.
[163]
Ji, Z. and Dasgupta, D., Real-valued negative selection using variable-sized detectors. In: K.D., (Ed.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO'04), Part I, Seattle, WA, USA, 26-30 June, 2004, volume 3102 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 287-298.
[164]
Ji, Z. and Dasgupta, D., Estimating the detector coverage in a negative selection algorithm. In: Beyer, H.-G., O'Reilly, U.-M. (Eds.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO'05), pp. 281-288.
[165]
Ji, Z. and Dasgupta, D., Applicability issues of the real-valued negative selection algorithms. In: Cattolico, M. (Ed.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO'06), pp. 111-118.
[166]
Ji, Z. and Dasgupta, D., Revisiting negative selection algorithm. Evolutionary Computation Journal. v15 i2. 223-251.
[167]
Jian, G., Da-xin, L. and Bin-ge, C., An induction learning approach for building intrusion detection models using genetic algorithms. In: The 5th World Congress on Intelligent Control and Automation (WCICA 2004), vol. 5, IEEE Press. pp. 4339-4342.
[168]
Jiang, J., Zhang, C. and Kame, M., RBF-based real-time hierarchical intrusion detection systems. In: Proceedings of the International Joint Conference on Neural Networks (IJCNN'03), vol. 2, IEEE Press. pp. 1512-1516.
[169]
Jirapummin, C., Wattanapongsakorn, N. and Kanthamanon, P., Hybrid neural networks for intrusion detection system. In: The 2002 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC'02), vol. 7, pp. 928-931.
[170]
H.G. Kayacik, Hierarchical self organizing map based ids on kdd benchmark, Master's Thesis, Dalhousie University, 2003.
[171]
Kayacik, H.G., Zincir-Heywood, A.N. and Heywood, M., Evolving successful stack overflow attacks for vulnerability testing. In: Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC'05), IEEE Press. pp. 8-15.
[172]
Kayacik, H.G., Zincir-Heywood, A.N. and Heywood, M.I., On the capability of an SOM based intrusion detection system. In: Proceedings of the International Joint Conference on Neural Networks (IJCNN'03), vol. 3, IEEE Press. pp. 1808-1813.
[173]
Kayacik, H.G., Zincir-Heywood, A.N. and Heywood, M.I., A hierarchical SOM-based intrusion detection system. Engineering Applications of Artificial Intelligence. v20 i4. 439-451.
[174]
Kennedy, J. and Eberhart, R., Particle swarm optimization. In: Proceedings of IEEE International Conference on Neural Networks, vol. 4, IEEE Press. pp. 1942-1948.
[175]
J. Kim, Integrating artificial immune algorithms for intrusion detection, PhD Thesis, Department of Computer Science, University College London, 2003.
[176]
Kim, J. and Bentley, P., Negative selection and niching by an artificial immune system for network intrusion detection. In: Banzhaf, W., Daida, J., Eiben, A.E., Garzon, M.H., Honavar, V., Jakiela, M., Smith, R.E. (Eds.), Late Breaking Papers in the Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 99), Morgan Kaufmann. pp. 149-158.
[177]
Kim, J. and Bentley, P., Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection. In: Fogel, D.B., El-Sharkawi, M.A., Yao, X., Greenwood, G., Iba, H., Marrow, P., Shackleton, M. (Eds.), Proceedings of the IEEE Congress on Evolutionary Computation (CEC'02), vol. 2, IEEE Press. pp. 1015-1020.
[178]
Kim, J., Bentley, P., Aickelin, U., Greensmith, J., Tedesco, G. and Twycross, J., Immune system approaches to intrusion detection-a review. Natural Computing: An International Journal. v6 i4. 413-466.
[179]
Kim, J., Bentley, P., Wallenta, C., Ahmed, M. and Hailes, S., Danger is ubiquitous: Detecting malicious activities in sensor networks using the dendritic cell algorithm. In: Bersini, H., Carneiro, J. (Eds.), Artificial Immune Systems, volume 4163 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 390-403.
[180]
Kim, J. and Bentley, P.J., Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator. In: Proceedings of the IEEE Congress on Evolutionary Computation (CEC'01), vol. 2, IEEE Press. pp. 1244-1252.
[181]
Kim, J. and Bentley, P.J., Immune memory in the dynamic clonal selection algorithm. In: Timmis, J., Bentley, P.J. (Eds.), Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS'02), University of Kent at Canterbury Printing Unit. pp. 57-65.
[182]
Kim, J. and Bentley, P.J., A model of gene library evolution in the dynamic clonal selection algorithm. In: Timmis, J., Bentley, P.J. (Eds.), Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS'02), University of Kent at Canterbury Printing Unit. pp. 175-182.
[183]
Kim, J. and Bentley, P.J., Immune memory and gene library evolution in the dynamical clonal selection algorithm. Journal of Genetic Programming and Evolvable Machines. v5 i4. 361-391.
[184]
Kim, J., Greensmith, J., Twycross, J. and Aickelin, U., Malicious code execution detection and response immune system inpired by the danger theory. In: Adaptive and Resilient Computing Security Workshop (ARCS 2005),
[185]
Kim, J., Wilson, W., Aickelin, U. and McLeod, J., Cooperative automated worm response and detection immune algorithm (CARDINAL) inspired by t-cell immunity and tolerance. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J. (Eds.), Proceedings of the 4th International Conference on Artificial Immune Systems (ICARIS'05), Banff, Alberta, CA, 14-17 August, 2005, volume 3627 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 168-181.
[186]
Kohonen, T., Self-organizing Maps, volume 30 of Springer Series in Information Sciences. 2001. 3rd edition. Springer, Berlin.
[187]
Kosko, B., Fuzzy cognitive maps. International Journal of Man-Machine Studies. v24 i1. 65-75.
[188]
Koza, J.R., Genetic Programming: On the Programming of Computers by Means of Natural Selection. 1992. MIT Press, Cambridge, MA, USA.
[189]
Kuok, C., Fu, A. and Wong, M., Mining fuzzy association rules in databases. The ACM SIGMOD Record. v27 i1. 41-46.
[190]
K. Labib, R. Vemuri, NSOM: a real-time network-based intrusion detection system using self-organizing maps. Technical report, Dept. of Applied Science, University of California, Davis, 2002.
[191]
LaRoche, P. and Zincir-Heywood, A.N., 802.11 network intrusion detection using genetic programming. In: Rothlauf, F. (Ed.), Workshop Proceedings of the Genetic and Evolutionary Computation Conference, pp. 170-171.
[192]
LaRoche, P. and Zincir-Heywood, A.N., Genetic programming based WiFi data link layer attack detection. In: Proceedings of the 4th Annual Communication Networks and Services Research Conference (CNSR 2006), IEEE Press. pp. 8-15.
[193]
Lee, K.-C. and Mikhailov, L., Intelligent intrusion detection system. In: Proceedings of the 2nd IEEE International Conference on Intelligence Systems, vol. 2, IEEE Press. pp. 497-502.
[194]
Lee, S.C. and Heinbuch, D.V., Training a neural-network based intrusion detector to recognize novel attacks. IEEE Transactions on Systems, Man and Cybernetics - Part A. v31 i4. 294-299.
[195]
Leon, E., Nasraoui, O. and Gomez, J., Anomaly detection based on unsupervised niche clustering with application to network intrusion detection. In: Proceedings of the IEEE Congress on Evolutionary Computation (CEC'04), vol. 1, IEEE Press. pp. 502-508.
[196]
Leung, K.S., Leung, Y., So, L. and Yam, K.F., Rule learning in expert systems using genetic algorithms. 1. Concepts. In: Proceeding of the 2nd International Conference on Fuzzy Logic and Neural Networks, vol. 1, pp. 201-204.
[197]
W. Li, A genetic algorithm approach to network intrusion detection. Technical report, SANS Institute, 2004.
[198]
Li, W., Using genetic algorithm for network intrusion detection. In: Proceedings of United States Department of Energy Cyber Security Group 2004 Training Conference,
[199]
Liao, Y., Vemuri, V.R. and Pasos, A., Adaptive anomaly detection with evolving connectionist systems. Journal of Network and Computer Applications. v30 i1. 60-80.
[200]
Lichodzijewski, P. and Heywood, M.I., Pareto-coevolutionary genetic programming for problem decomposition in multi-class classification. In: Lipson, H. (Ed.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO'07), pp. 464-471.
[201]
Lichodzijewski, P., Zincir-Heywood, A. and Heywood, M.I., Dynamic intrusion detection using self-organizing maps. In: The 14th Annual Canadian Information Technology Security Symposium,
[202]
Lichodzijewski, P., Zincir-Heywood, A. and Heywood, M.I., Host-based intrusion detection using self-organizing maps. In: The IEEE World Congress on Computational Intelligence, International Joint Conference on Neural Networks (IJCNN'02), vol. 2, IEEE Press. pp. 1714-1719.
[203]
Liu, F. and Lin, L., Unsupervised anomaly detection based on an evolutionary artificial immune network. In: R., F. (Ed.), Applications on Evolutionary Computing-EvoWorkkshops 2005: EvoBIO, EvoCOMNET, EvoHOT, EvoIASP, EvoMUSART, and EvoSTOC, Lausanne, Switzerland, 30 March 30-1 April 2005, volume 3449 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 166-174.
[204]
Liu, F. and Luo, L., Immune clonal selection wavelet network based intrusion detection. In: Duch, W., Kacprzyk, J., Oja, E., Zadroz¿ny, S. (Eds.), Artificial Neural Networks: Biological Inspirations-ICANN, volume 3696 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 331-336.
[205]
Liu, F., Qu, B. and Chen, R., Intrusion detection based on immune clonal selection algorithms. In: Webb, G.I., Yu, X. (Eds.), AI 2004: Advances in Artificial Intelligence, volume 3339 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 1226-1232.
[206]
Liu, Z., Florez, G. and Bridges, S.M., A comparison of input representations in neural networks: a case study in intrusion detection. In: Proceedings of the International Joint Conference on Neural Networks (IJCNN'02), vol. 2, IEEE Press. pp. 1708-1713.
[207]
W. Lu, An unsupervised anomaly detection framework for multiple-connection based network intrusions, PhD Thesis, Department of Electrical and Computer Engineering, University of Victoria, 2005.
[208]
Lu, W. and Traore, I., Detecting new forms of network intrusion using genetic programming. Computational Intelligence. v20 i3. 475-494.
[209]
W. Lu, I. Traore, An unsupervised anomaly detection framework for network intrusions. Technical report, Information Security and Object Technology (ISOT) Group, University of Victoria, October 2005.
[210]
Luo, J. and Bridges, S.M., Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection. International Journal of Intelligent Systems. v15 i8. 687-703.
[211]
Luo, J., Bridges, S.M. and Vaughn, R.B., Fuzzy frequent episodes for real-time intrusion detection. In: The 10th IEEE International Conference on Fuzzy Systems (FUZZ'01), vol. 1, IEEE Press. pp. 368-371.
[212]
Luo, W., Wang, X. and Wang, X., A novel fast negative selection algorithm enhanced by state graphs. In: de Castro, L.N., Knidel, F.J.Z.H. (Eds.), Artificial Immune Systems, volume 4628 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 168-181.
[213]
Luther, K., Bye, R., Alpcan, T., Muller, A. and Albayrak, S., A cooperative ais framework for intrusion detection. In: IEEE International Conference on Communications (ICC'07), pp. 1409-1416.
[214]
Mahfoud, S.W., Crossover interactions among niches. In: Proceedings of the 1st IEEE Conference on Evolutionary Computation, vol. 1, pp. 188-193.
[215]
M.V. Mahoney, P.K. Chan, An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection. Technical Report TR CS-2003-02, Computer Science Department, Florida Institute of Technology, 2003.
[216]
Mannila, H. and Toivonen, H., Discovering generalized episodes using minimal occurrences. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, AAAI Press. pp. 146-151.
[217]
Matzinger, P., Tolerance, danger and the extended family. Annual Review in Immunology. v12. 991-1045.
[218]
Matzinger, P., The danger model in its historical context. Scandinavian Journal of Immunology. v54 i1-2. 4-9.
[219]
McHugh, J., Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by Lincoln laboratory. ACM Transactions on Information and System Security. v3 i4. 262-294.
[220]
Mé, L., GASSATA, a genetic algorithm as an alternative tool for security audit trails analysis. In: Proceedings of the 1st International Workshop on the Recent Advances in Intrusion Detection (RAID 98),
[221]
Mischiatti, M. and Neri, F., Applying local search and genetic evolution in concept learning systems to detect intrusion in computer networks. In: de Mántaras, R.L., Plaza, E. (Eds.), Proceedings of the 11th European Conference on Machine Learning (ECML'00), Barcelona, Spain, 31 May-2 June 2000, volume 1810 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg.
[222]
Mitrokotsa, A. and Douligeris, C., Detecting denial of service attacks using emergent self-organizing maps. In: Proceedings of the 5th IEEE International Symposium on Signal Processing and Information Technology, IEEE Press. pp. 375-380.
[223]
Mitrokotsa, A. and Douligeris, C., Intrusion detection using emergent self-organizing maps advances in artificial intelligence. In: Antoniou, G., Potamias, G., Spyropoulos, C., Plexousakis, D. (Eds.), Advances in Artificial Intelligence, volume 3955 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg, SETN. pp. 559-562.
[224]
Mitrokotsa, A., Komninos, N. and Douligeris, C., Towards an effective intrusion response engine combined with intrusion detection in ad hoc networks. In: The Sixth Annual Mediterranean Ad Hoc Networking WorkShop,
[225]
Mohajerani, M., Moeini, A. and Kianie, M., NFIDS: a neuro-fuzzy intrusion detection system. In: Proceedings of the 2003 10th IEEE International Conference on Electronics, Circuits and Systems (ICECS'03), vol. 1, pp. 348-351.
[226]
Moradi, M. and Zulkernine, M., A neural network based system for intrusion detection and classification of attacks. In: Proceedings of the 2004 IEEE International Conference on Advances in Intelligent Systems-Theory and Applications, IEEE Press.
[227]
Mukkamala, S. and Sung, A.H., A comparative study of techniques for intrusion detection. In: Proceedings of 15th IEEE International Conference on Tools with Artificial Intelligence, IEEE Press. pp. 570-577.
[228]
Mukkamala, S., Sung, A.H. and Abraham, A., Modeling intrusion detection systems using linear genetic programming approach. In: Orchard, R., Yang, C., Ali, M. (Eds.), The 17th International Conference on Industrial&Engineering Applications of Artificial Intelligence and Expert Systems, Innovations in Applied Artificial Intelligence, volume 3029 of Lecture Notes in Computer Science, Springer Verlag, Germany. pp. 633-642.
[229]
Mukkamala, S., Sung, A.H. and Abraham, A., Intrusion detection using an ensemble of intelligent paradigms. Journal of Network and Computer Applications. v28 i2. 167-182.
[230]
Neri, F., Mining TCP/IP traffic for network intrusion detection by using a distributed genetic algorithm. In: de Mántaras, R.L., Plaza, E. (Eds.), Proceedings of the 11th European Conference on Machine Learning (ECML'00), Barcelona, Spain, 31 May-2 June 2000, volume 1810 of Lecture Notes in Computer Science, Berlin/Heidelberg. pp. 313-322.
[231]
In: Olariu, S., Zomaya, A.Y. (Eds.), Handbook of Bioinspired Algorithms and Applications, Chapman&Hall/CRC.
[232]
M. Oltean, Multi expression programming. Technical report, Department of Computer Science, Babes-Bolyai University, 4 June 2006.
[233]
Ostaszewski, M., Seredynski, F. and Bouvry, P., Immune anomaly detection enhanced with evolutionary paradigms. In: Cattolico, M. (Ed.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO'06), pp. 119-126.
[234]
Ostaszewski, M., Seredynski, F. and Bouvry, P., A nonself space approach to network anomaly detection. In: 20th International Parallel and Distributed Processing Symposium (IPDPS'06), IEEE Press. pp. 8-16.
[235]
Ostaszewski, M., Seredynski, F. and Bouvry, P., Coevolutionary-based mechanisms for network anomaly detection. Journal of Mathematical Modelling and Algorithms. v6 i3. 411-431.
[236]
Özyer, T., Alhajj, R. and Barker, K., Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening. Journal of Network and Computer Applications. v30 i1. 99-113.
[237]
Parpinelli, R., Lopes, H. and Freitas, A., Data mining with an ant colony optimization algorithm. IEEE Transactions on Evolutionary Computation. v6 i4. 321-332.
[238]
Peddabachigari, S., Abraham, A., Grosan, C. and Thomas, J., Modeling intrusion detection system using hybrid intelligent systems. Journal of Network and Computer Applications. v30 i1. 114-132.
[239]
Perelson, A., Hightower, R. and Forrest, S., Evolution and somatic learning in V-region genes. Research in Immunology. v147 i4. 202-208.
[240]
Pillai, M.M., Eloff, J.H. and Venter, H.S., An approach to implement a network intrusion detection system using genetic algorithms. In: Proceedings of the 2004 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, volume 75 of ACM International Conference Proceeding Series, South African Institute for Computer Scientists and Information Technologist, Stellenbosch, Western Cape, South Africa. pp. 221
[241]
Poole, D., Mackworth, A. and Goebel, R., Computational Intelligence-A Logical Approach. 1998. Oxford University Press, Oxford, UK.
[242]
Ramos, V. and Abraham, A., ANTIDS: self-organized ant-based clustering model for intrusion detection system. In: The 4th IEEE International Workshop on Soft Computing as Transdisciplinary Science and Technology (WSTST'05), IEEE Press.
[243]
Rapaka, A., Novokhodko, A. and Wunsch, D., Intrusion detection using radial basis function network on sequence of system calls. In: Proceedings of the International Joint Conference on Neural Networks (IJCNN'03), vol. 3, IEEE Press. pp. 1820-1825.
[244]
Rhodes, B.C., Mahaffey, J.A. and Cannady, J.D., Multiple self-organizing maps for intrusion detection. In: Proceedings of the 23rd National Information Systems Security Conference, pp. 16-19.
[245]
Ryan, J., Lin, M.J. and Miikkulainen, R., Intrusion detection with neural networks. Advances in Neural Information Processing Systems. v10. 943-949.
[246]
Sabhnani, M. and Serpen, G., Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set. Intelligent Data Analysis. v8 i4. 403-415.
[247]
Sarasamma, S.T., Zhu, Q.A. and Huff, J., Hierarchical kohonenen net for anomaly detection in network security. IEEE Transactions on Systems, Man and Cybernetics - Part B. v35 i2. 302-312.
[248]
Seo, H., Kim, T. and Kim, H., Modeling of distributed intrusion detection using fuzzy system. In: Huang, D.-S., Li, K., Irwin, G.W. (Eds.), Computational Intelligence, volume 4114 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 165-170.
[249]
Shafi, K., Abbass, H. and Zhu, W., Real time signature extraction during adaptive rule discovery using ucs. In: Srinivasan, D., Wang, L. (Eds.), Proceedings of the IEEE Congress on Evolutionary Computation (CEC'07), IEEE Press. pp. 2509-2516.
[250]
Shafi, K., Abbass, H.A. and Zhu, W., An adaptive rule-based intrusion detection architecture. In: The Security Technology Conference, the 5th Homeland Security Summit, pp. 345-355.
[251]
Shafi, K., Abbass, H.A. and Zhu, W., The role of early stopping and population size in xcs for intrusion detection. In: Wang, T.-D., Li, X., Chen, S.-H., Wang, X., Abbass, H., Iba, H., Chen, G., Yao, X. (Eds.), Simulated Evolution and Learning, volume 4247 of Lecture Notes in Computer Science, 50-57, Springer, Berlin/Heidelberg.
[252]
Shafi, K., Kovacs, T., Abbass, H.A. and Zhu, W., Intrusion detection with evolutionary learning classifier systems. Natural Computing. v8 i1. 3-27.
[253]
Shah, H., Undercoffer, J. and Joshi, A., Fuzzy clustering for intrusion detection. In: The 12th IEEE International Conference on Fuzzy Systems (FUZZ'03), vol. 2, IEEE Press. pp. 1274-1278.
[254]
Shapiro, J.M., Lamont, G.B. and Peterson, G.L., An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection. In: Beyer, H.-G., O'Reilly, U.-M. (Eds.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO'05), pp. 337-344.
[255]
Sinclair, C., Pierce, L. and Matzner, S., An application of machine learning to network intrusion detection. In: Proceedings of 15th Annual Computer Security Applications Conference (ACSAC'99), IEEE Computer Society. pp. 371-377.
[256]
Siraj, A., Bridges, S.M. and Vaughn, R.B., Fuzzy cognitive maps for decision support in an intelligent intrusion detection system. In: Proceedings of the 20th International Conference of the North American Fuzzy Information Society (NAFIPS'01) and Joint the 9th IFSA World Congress, vol. 4, IEEE Press. pp. 2165-2170.
[257]
Siraj, A., Vaughn, R.B. and Bridges, S.M., Intrusion sensor data fusion in an intelligent intrusion detection system architecture. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04), vol. 9, IEEE Press. pp. 10-20.
[258]
Somayaji, A., Hofmeyr, S.A. and Forrest, S., Principles of a computer immune system. In: Proceedings of the 1997 workshop on New Security paradigms, pp. 75-82.
[259]
D. Song, A linear genetic programming approach to intrusion detection, Master's Thesis, Dalhousie University, March 2003.
[260]
Song, D., Heywood, M.I. and Zincir-Heywood, A.N., A linear genetic programming approach to intrusion detection. In: C.-P., E. (Ed.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO'03), Part II, Chicago, IL, USA, 12-16 July, 2003, volume 2724 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 2325-2336.
[261]
Song, D., Heywood, M.I. and Zincir-Heywood, A.N., Training genetic programming on half a million patterns: an example from anomaly detection. IEEE Transactions on Evolutionary Computation. v9 i3. 225-239.
[262]
Stibor, T., Mohr, P. and Timmis, J., Is negative selection appropriate for anomaly detection?. In: Beyer, H.-G., O'Reilly, U.-M. (Eds.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO'05), pp. 321-328.
[263]
Stibor, T., Timmis, J. and Eckert, C., A comparative study of real-valued negative selection to statistical anomaly detection techniques. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J. (Eds.), Artificial Immune Systems, volume 3627 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 262-275.
[264]
Tan, K., The application of neural networks to unix computer security. In: Proceedings of IEEE International Conference on Neural Networks, vol. 1, IEEE Press. pp. 476-481.
[265]
Tedesco, G., Twycross, J. and Aickelin, U., Integrating innate and adaptive immunity for intrusion detection. In: Bersini, H., Carneiro, J. (Eds.), Proceedings of the 5th International Conference on Artificial Immune Systems (ICARIS'06), Oeiras, Portugal, 4-6 September 2006, volume 4163 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 193-202.
[266]
Tian, J., Fu, Y., Xu, Y. and ling Wang, J., Intrusion detection combining multiple decision trees by fuzzy logic. In: Proceedings of the Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'05), IEEE Press. pp. 256-258.
[267]
Timmis, J., Artificial immune systems-today and tomorrow. Natural Computing. v6 i1. 1-18.
[268]
Toosi, A.N. and Kahani, M., A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Computer Communications. v30 i10. 2201-2212.
[269]
Tsang, C.-H. and Kwong, S., Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction. In: IEEE International Conference on Industrial Technology (ICIT'05), IEEE Press. pp. 51-56.
[270]
Tsang, C.-H. and Kwong, S., Ant colony clustering and feature extraction for anomaly intrusion detection. In: Abraham, A., Grosan, C., Ramos, V. (Eds.), Swarm Intelligence in Data Mining, volume 34 of Studies in Computational Intelligence, Springer, Berlin/Heidelberg. pp. 101-123.
[271]
Tsang, C.-H., Kwong, S. and Wang, H., Anomaly intrusion detection using multi-objective genetic fuzzy system and agent-based evolutionary computation framework. In: Proceedings of the Fifth IEEE International Conference on Data Mining (ICDM'05), IEEE Press. pp. 4-7.
[272]
Tsang, C.-H., Kwong, S. and Wang, H., Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recognition. v40 i9. 2373-2391.
[273]
Twycross, J. and Aickelin, U., Libtissue-implementing innate immunity. In: G.Y., G. (Ed.), Proceedings of the IEEE Congress on Evolutionary Computation (CEC'06), IEEE Press. pp. 499-506.
[274]
J. Twycross, U. Aickelin, Detecting anomalous process behaviour using second generation artificial immune systems. Retrieved 26 January 2008, from http://www.cpib.ac.uk/jpt/papers/raid-2007.pdf, 2007.
[275]
Twycross, J. and Aickelin, U., An immune-inspired approach to anomaly detection. In: Gupta, J.N.D., Sharma, S.K. (Eds.), Handbook of Research on Information Assurance and Security, Information Science Reference, Hershey, PA. pp. 109-121.
[276]
J.P. Twycross, Integrated innate and adaptive artificial immune systems applied to process anomaly detection, PhD Thesis, The University of Nottingham, January 2007.
[277]
Wang, W., Guan, X., Zhang, X. and Yang, L., Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data. Computers&Security. v25 i7. 539-550.
[278]
Watkins, A., Timmis, J. and Boggess, L., Artificial immune recognition system (airs): an immune-inspired supervised learning algorithm. Genetic Programming and Evolvable Machines. v5 i3. 291-317.
[279]
Wierzchon, S., Generating optimal repertoire of antibody strings in an artificial immune system. In: Proceedings of the IIS'2000 Symposium on Intelligent Information Systems, Physica-Verlag. pp. 119-133.
[280]
Williams, P.D., Anchor, K.P., Bebo, J.L., Gunsch, G.H. and Lamont, G.D., CDIS: towards a computer immune system for detecting network intrusions. In: Lee, W., Mé, L., Wespi, A. (Eds.), Proceedings of the 4th International Workshop on Recent Advances in Intrusion Detection (RAID'01), Davis, CA, USA, 10-12 October, volume 2212 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 117-133.
[281]
Wilson, D. and Kaur, D., Using grammatical evolution for evolving intrusion detection rules. In: Proceedings of the 5th WSEAS Int. Conf. on Circuits, Systems, Electronics, Control&Signal Processing, pp. 42-47.
[282]
Xia, T., Qu, G., Hariri, S. and Yousif, M., An efficient network intrusion detection method based on information theory and genetic algorithm. In: The 24th IEEE International Conference on Performance, Computing, and Communications (IPCCC 2005), IEEE Press. pp. 11-17.
[283]
Xian, J., Lang, F. and Tang, X., A novel intrusion detection method based on clonal selection clustering algorithm. In: Proceedings of 2005 International Conference on Machine Learning and Cybernetics, vol. 6, pp. 3905-3910.
[284]
Xin, J., Dickerson, J.E. and Dickerson, J.A., Fuzzy feature extraction and visualization for intrusion detection. In: The 12th IEEE International Conference on Fuzzy Systems (FUZZ'03), vol. 2, IEEE Press. pp. 1249-1254.
[285]
Xu, Q., Pei, W., Yang, L. and Zhao, Q., An intrusion detection approach based on understandable neural network trees. International Journal of Computer Science and Network Security. v6 i11. 229-234.
[286]
Yao, J., Zhao, S. and Saxton, L.V., A study on fuzzy intrusion detection. In: Proceedings of SPIE: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, vol. 5812, pp. 23-30.
[287]
Yin, C., Tian, S., Huang, H. and He, J., Applying genetic programming to evolve learned rules for network anomaly detection. In: Wang, L., Chen, K., Ong, Y.S. (Eds.), Advances in Natural Computation, volume 3612 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 323-331.
[288]
Yu, Y., Gao, F. and Ge, Y., Hybrid BP/CNN neural network for intrusion detection. In: Proceedings of the 3rd International Conference on Information security, volume 85 of ACM International Conference Proceeding Series, pp. 226-228.
[289]
Zadeh, L., Role of soft computing and fuzzy logic in the conception, design and development of information/intelligent systems. In: Kaynak, O., Zadeh, L., Turksen, B., Rudas, I. (Eds.), Computational Intelligence: Soft Computing and Fuzzy-neuro Integration with Applications; Proceedings of the NATO Advanced Study Institute on Soft Computing and its Applications held at Manavgat, Antalya, Turkey, 21-31 August 1996, volume 162 of NATO ASI Series, Springer, Berlin/Heidelberg. pp. 1-9.
[290]
Zanero, S., Analyzing TCP traffic patterns using self organizing maps. In: Roli, F., Vitulano, S. (Eds.), International Conference on Image Analysis and Processing (ICIAP'05), Cagliari, Italy, 6-8 September 2005, volume 3617 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 83-90.
[291]
Zanero, S., Improving self organizing map performance for network intrusion detection. In: International Workshop on Clustering High-dimensional Data and its Applications, in Conjunction with the 5th SIAM International Conference on Data Mining (SDM'05),
[292]
Zanero, S. and Savaresi, S.M., Unsupervised learning techniques for an intrusion detection system. In: Proceedings of the ACM Symposium on Applied Computing (ACM SAC'04), Computer security, ACM. pp. 412-419.
[293]
Zeng, J., Li, T., Liu, X., Liu, C., Peng, L. and Sun, F., A feedback negative selection algorithm to anomaly detection. In: Third International Conference on Natural Computation (ICNC 2007), vol. 3, IEEE Press. pp. 604-608.
[294]
Zhang, B., Internet intrusion detection by autoassociative neural network. In: Proceedings of International Symposium on Information&Communications Technologies,
[295]
Zhang, C., Jiang, J. and Kamel, M., Comparison of BPL and RBF network in intrusion detection system. In: Wang, G., Liu, Q., Yao, Y., Skowron, A. (Eds.), Proceedings of the 9th International Conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing (RSFDGrC'03), 26-29 May, Chongqing, China, volume 2639 of Lecture Notes in Computer Science, chapter Proceedings of the 9th International Conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing (RSFDGrC'03), Springer, Berlin/Heidelberg. pp. 466-470.
[296]
Zhang, Z., Li, J., Manikopoulos, C., Jorgenson, J. and Ucles, J., HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification. In: Proceedings of the 2001 IEEE Workshop Information Assurance and Security, IEEE Press. pp. 85-90.
[297]
Zhao, J., Zhao, J. and Li, J., Intrusion detection based on clustering genetic algorithm. In: Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, vol. 6, IEEE Press. pp. 3911-3914.
[298]
Zheng, C. and Chen, L., FCBI-an efficient user-friendly classifier using fuzzy implication table. In: Kalinichenko, L., Manthey, R., Thalheim, B., Wloka, U. (Eds.), Advances in Databases and Information Systems, volume 2798 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg. pp. 266-277.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Applied Soft Computing
Applied Soft Computing  Volume 10, Issue 1
January, 2010
361 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 01 January 2010

Author Tags

  1. Artificial immune systems
  2. Artificial neural networks
  3. Computational intelligence
  4. Evolutionary computation
  5. Fuzzy systems
  6. Intrusion detection
  7. Soft computing
  8. Survey
  9. Swarm intelligence

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Intrusion Detection SystemJournal of Database Management10.4018/JDM.33827635:1(1-25)Online publication date: 21-Feb-2024
  • (2024)Computational intelligence and its dynamic development: statistical exploration, comprehensive evaluation and prospect expansionSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-024-09789-728:17-18(9371-9386)Online publication date: 1-Sep-2024
  • (2023)Negative selection in anomaly detection—A surveyComputer Science Review10.1016/j.cosrev.2023.10055748:COnline publication date: 1-May-2023
  • (2023)Multi-objective evolving long–short term memory networks with attention for network intrusion detectionApplied Soft Computing10.1016/j.asoc.2023.110216139:COnline publication date: 1-May-2023
  • (2023)Intelligent feature selection model based on particle swarm optimization to detect phishing websitesMultimedia Tools and Applications10.1007/s11042-023-15399-682:29(44943-44975)Online publication date: 1-Dec-2023
  • (2023)Evolving Lightweight Intrusion Detection Systems for RPL-Based Internet of ThingsApplications of Evolutionary Computation10.1007/978-3-031-30229-9_12(177-193)Online publication date: 12-Apr-2023
  • (2022)Evolutionary computation and machine learning in securityProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3520304.3534087(1572-1601)Online publication date: 9-Jul-2022
  • (2022)A survey on deep learning for cybersecurityComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2022.109032212:COnline publication date: 20-Jul-2022
  • (2022)Robustness improvement of component-based cloud computing systemsThe Journal of Supercomputing10.1007/s11227-021-04054-278:4(4977-5009)Online publication date: 1-Mar-2022
  • (2022)Intrusion detection system over real-time data traffic using machine learning methods with feature selection approachesInternational Journal of Information Security10.1007/s10207-022-00616-422:1(1-27)Online publication date: 6-Oct-2022
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media