Chapter 4 - A Survey of Intrusion Detection Systems Using Evolutionary Computation
References (0)
Cited by (36)
Adoption and utilization of medical decision support systems in the diagnosis of febrile Diseases: A systematic literature review
2023, Expert Systems with ApplicationsA dynamic trust management model for vehicular ad hoc networks
2023, Vehicular CommunicationsHost-based IDS: A review and open issues of an anomaly detection system in IoT
2022, Future Generation Computer SystemsCitation Excerpt :In this sense, security solutions need to be updated to detect dynamic changes in a fast and accurate way as the underlying assumptions used to validate the system can be affected, reducing its relevance with time [15]. Finally, an intrusion system depicted as a detection problem belongs to a dynamic and real-time anomaly detection scenario designed to identify possible attacks and proper responses [16], the number of threats can be considerably lower than the ordinary events, resulting in an imbalanced setting. Additionally, when dealing with cyber threats, an attacker could target the intrusion system, manipulating its predictions and responses, which adds the adversarial prospect to the security contextualization presented in Fig. 2.
A review of recent approaches on wrapper feature selection for intrusion detection
2022, Expert Systems with ApplicationsReview on layout optimization strategies of offshore parks for wave energy converters
2022, Renewable and Sustainable Energy ReviewsCitation Excerpt :These techniques usually could be distinguished by the different approaches in terms of how they represent the individuals. For example, genetic algorithms usually encode candidates on a form of strings over a finite alphabet, while evolution strategies use real-valued vectors and Genetic Programming employs “trees” [79,80]. The genetic algorithms (GA) are the most recognized type of evolutionary algorithm and have been applied several times as function optimization and search method [79].
Role of swarm and evolutionary algorithms for intrusion detection system: A survey
2020, Swarm and Evolutionary ComputationCitation Excerpt :The survey also discusses the existing research issues and open research questions. The components and functionalities of IDS along with the use of GA in IDS for mobile ad hoc networks is presented in Ref. [22]. A survey on GA, ACO, and PSO algorithms implemented for IDS is presented in Ref. [23].