Chapter 4 - A Survey of Intrusion Detection Systems Using Evolutionary Computation

https://doi.org/10.1016/B978-0-12-801538-4.00004-5Get rights and content

Abstract

Intrusion detection is an indispensable part of a security system. Because new attacks are emerging every day, intrusion detection systems (IDSs) play a key role in identifying possible attacks to the system and giving proper responses. IDSs should adapt to these new attacks and attack strategies, and continuously improve. How to develop effective, efficient, and adaptive IDSs is a question that researchers have been working on for decades. Researchers have been exploring the suitability of different techniques to this research domain. The evolutionary computation (EC) inspired from natural evolution is one of the approaches increasingly studied. Some characteristics, such as producing readable outputs for security experts, producing lightweight solutions, and providing a set of solutions with different trade-offs between conflict objectives, make these techniques a promising candidate for the problem. In this study, we survey the proposed intrusion detection approaches based on EC techniques found in the literature. Each major research area on intrusion detection is investigated thoroughly from the EC point of view. Possible future research directions are also summarized for researchers.

References (0)

Cited by (36)

  • Host-based IDS: A review and open issues of an anomaly detection system in IoT

    2022, Future Generation Computer Systems
    Citation Excerpt :

    In this sense, security solutions need to be updated to detect dynamic changes in a fast and accurate way as the underlying assumptions used to validate the system can be affected, reducing its relevance with time [15]. Finally, an intrusion system depicted as a detection problem belongs to a dynamic and real-time anomaly detection scenario designed to identify possible attacks and proper responses [16], the number of threats can be considerably lower than the ordinary events, resulting in an imbalanced setting. Additionally, when dealing with cyber threats, an attacker could target the intrusion system, manipulating its predictions and responses, which adds the adversarial prospect to the security contextualization presented in Fig. 2.

  • Review on layout optimization strategies of offshore parks for wave energy converters

    2022, Renewable and Sustainable Energy Reviews
    Citation Excerpt :

    These techniques usually could be distinguished by the different approaches in terms of how they represent the individuals. For example, genetic algorithms usually encode candidates on a form of strings over a finite alphabet, while evolution strategies use real-valued vectors and Genetic Programming employs “trees” [79,80]. The genetic algorithms (GA) are the most recognized type of evolutionary algorithm and have been applied several times as function optimization and search method [79].

  • Role of swarm and evolutionary algorithms for intrusion detection system: A survey

    2020, Swarm and Evolutionary Computation
    Citation Excerpt :

    The survey also discusses the existing research issues and open research questions. The components and functionalities of IDS along with the use of GA in IDS for mobile ad hoc networks is presented in Ref. [22]. A survey on GA, ACO, and PSO algorithms implemented for IDS is presented in Ref. [23].

View all citing articles on Scopus
View full text