Chapter 4 - A Survey of Intrusion Detection Systems Using Evolutionary Computation

Created by W.Langdon from gp-bibliography.bib Revision:1.3872

@InCollection{Sen:2015:BCT,
  author =       "Sevil Sen",
  title =        "Chapter 4 - A Survey of Intrusion Detection Systems
                 Using Evolutionary Computation",
  editor =       "Xin-She Yang and Su Fong Chien and Tiew On Ting",
  booktitle =    "Bio-Inspired Computation in Telecommunications",
  publisher =    "Morgan Kaufmann",
  address =      "Boston",
  year =         "2015",
  pages =        "73--94",
  isbn13 =       "978-0-12-801538-4",
  DOI =          "doi:10.1016/B978-0-12-801538-4.00004-5",
  URL =          "http://www.sciencedirect.com/science/article/pii/B9780128015384000045",
  abstract =     "Intrusion detection is an indispensable part of a
                 security system. Because new attacks are emerging every
                 day, intrusion detection systems (IDSs) play a key role
                 in identifying possible attacks to the system and
                 giving proper responses. IDSs should adapt to these new
                 attacks and attack strategies, and continuously
                 improve. How to develop effective, efficient, and
                 adaptive IDSs is a question that researchers have been
                 working on for decades. Researchers have been exploring
                 the suitability of different techniques to this
                 research domain. The evolutionary computation (EC)
                 inspired from natural evolution is one of the
                 approaches increasingly studied. Some characteristics,
                 such as producing readable outputs for security
                 experts, producing lightweight solutions, and providing
                 a set of solutions with different trade-offs between
                 conflict objectives, make these techniques a promising
                 candidate for the problem. In this study, we survey the
                 proposed intrusion detection approaches based on EC
                 techniques found in the literature. Each major research
                 area on intrusion detection is investigated thoroughly
                 from the EC point of view. Possible future research
                 directions are also summarised for researchers.",
  keywords =     "genetic algorithms, genetic programming, Network
                 security, Intrusion detection, Evolutionary
                 computation, Grammatical evolution, Multiobjective
                 evolutionary computation",
}

Genetic Programming entries for Sevil Sen

Citations