[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1068009.1068274acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
Article

Analysis and mathematical justification of a fitness function used in an intrusion detection system

Published: 25 June 2005 Publication History

Abstract

Convergence to correct solutions in Genetic Algorithms depends largely on the fitness function. A fitness function that captures all goals and constraints can be difficult to find. This paper gives a mathematical justification for a fitness function that has previously been demonstrated experimentally to be effective.

References

[1]
P. Diaz-Gomez and D. Hougen. Improved off-line intrusion detection using a genetic algorithm. To appear in Proceedings of the Seventh International Conference on Enterprise Information Systems, 2005.
[2]
P. A. Diaz-Gomez and D. F. Hougen. Analysis of an off-line intrusion detection system: A case study in multi-objective genetic algorithms. To appear in the Florida Artificial Intelligence Research Society Conference., 2005.
[3]
D. Fried and M. Zissman. Intrusion detection evaluation. Technical report, Lincoln Laboratory, MIT, 1998. http://www.ll.mit.edu/IST/ideval/, accessed March 2004.
[4]
F. M. Ham and I. Kostanic. Principles of Neurocomputing for Science & Engineering. McGraw Hill, 2001.
[5]
L. Mé. GASSATA, a genetic algorithm as an alternative tool for security audit trail analysis. In First International Workshop on the Recent Advances in Intrusion Detection, Belgium, 1998.

Cited By

View all
  • (2010)ReviewApplied Soft Computing10.1016/j.asoc.2009.06.01910:1(1-35)Online publication date: 1-Jan-2010
  • (2006)A Genetic Algorithm Approach for Doing Misuse Detection in Audit Trail FilesProceedings of the 15th International Conference on Computing10.1109/CIC.2006.6(329-338)Online publication date: 21-Nov-2006
  • (2005)Computational intelligence for network intrusion detectionProceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I10.1007/11596448_25(170-175)Online publication date: 15-Dec-2005

Index Terms

  1. Analysis and mathematical justification of a fitness function used in an intrusion detection system

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      GECCO '05: Proceedings of the 7th annual conference on Genetic and evolutionary computation
      June 2005
      2272 pages
      ISBN:1595930108
      DOI:10.1145/1068009
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 25 June 2005

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. fitness function
      2. genetic algorithms
      3. intrusion detection systems

      Qualifiers

      • Article

      Conference

      GECCO05
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,669 of 4,410 submissions, 38%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 16 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2010)ReviewApplied Soft Computing10.1016/j.asoc.2009.06.01910:1(1-35)Online publication date: 1-Jan-2010
      • (2006)A Genetic Algorithm Approach for Doing Misuse Detection in Audit Trail FilesProceedings of the 15th International Conference on Computing10.1109/CIC.2006.6(329-338)Online publication date: 21-Nov-2006
      • (2005)Computational intelligence for network intrusion detectionProceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I10.1007/11596448_25(170-175)Online publication date: 15-Dec-2005

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media