Detecting New Forms of Network Intrusion Using Genetic Programming
Created by W.Langdon from
gp-bibliography.bib Revision:1.8081
- @Article{Lu:2004:CI,
-
author = "Wei Lu and Issa Traore",
-
title = "Detecting New Forms of Network Intrusion Using Genetic
Programming",
-
journal = "Computational Intelligence",
-
year = "2004",
-
volume = "20",
-
number = "3",
-
pages = "475--494",
-
month = aug,
-
keywords = "genetic algorithms, genetic programming, network
security, intrusion detection, anomaly detection, rule
evolution, rule coverage",
-
URL = "https://onlinelibrary.wiley.com/doi/abs/10.1111/j.0824-7935.2004.00247.x",
-
eprint = "https://onlinelibrary.wiley.com/doi/pdf/10.1111/j.0824-7935.2004.00247.x",
-
DOI = "doi:10.1111/j.0824-7935.2004.00247.x",
-
abstract = "How to find and detect novel or unknown network
attacks is one of the most important objectives in
current intrusion detection systems. In this paper, a
rule evolution approach based on Genetic Programming
(GP) for detecting novel attacks on networks is
presented and four genetic operators, namely
reproduction, mutation, crossover, and dropping
condition operators, are used to evolve new rules. New
rules are used to detect novel or known network
attacks. A training and testing dataset proposed by
DARPA is used to evolve and evaluate these new rules.
The proof of concept implementation shows that a rule
generated by GP has a low false positive rate (FPR), a
low false negative rate and a high rate of detecting
unknown attacks. Moreover, the rule base composed of
new rules has high detection rate with low FPR. An
alternative to the DARPA evaluation approach is also
investigated.",
-
notes = "Also known as
\cite{https://doi.org/10.1111/j.0824-7935.2004.00247.x}",
- }
Genetic Programming entries for
Wei Lu
Issa Traore
Citations