Sciweavers

13 search results - page 1 / 3
» An evolutionary algorithm to generate ellipsoid network intr...
Sort
View
GECCO
2005
Springer
108views Optimization» more  GECCO 2005»
14 years 3 days ago
An evolutionary algorithm to generate ellipsoid network intrusion detectors
Joseph M. Shapiro, Gary B. Lamont, Gilbert L. Pete...
ICARIS
2007
Springer
14 years 22 days ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
GECCO
2005
Springer
121views Optimization» more  GECCO 2005»
14 years 3 days ago
An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection
This paper introduces hyper-ellipsoids as an improvement to hyper-spheres as intrusion detectors in a negative selection problem within an artificial immune system. Since hyper-s...
Joseph M. Shapiro, Gary B. Lamont, Gilbert L. Pete...
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
14 years 21 days ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
IAW
2003
IEEE
13 years 12 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...