Chapter 4 - A Survey of Intrusion Detection Systems Using Evolutionary Computation
Created by W.Langdon from
gp-bibliography.bib Revision:1.8051
- @InCollection{Sen:2015:BCT,
-
author = "Sevil Sen",
-
title = "Chapter 4 - A Survey of Intrusion Detection Systems
Using Evolutionary Computation",
-
editor = "Xin-She Yang and Su Fong Chien and Tiew On Ting",
-
booktitle = "Bio-Inspired Computation in Telecommunications",
-
publisher = "Morgan Kaufmann",
-
address = "Boston",
-
year = "2015",
-
pages = "73--94",
-
keywords = "genetic algorithms, genetic programming, Network
security, Intrusion detection, Evolutionary
computation, Grammatical evolution, Multiobjective
evolutionary computation",
-
isbn13 = "978-0-12-801538-4",
-
URL = "https://web.cs.hacettepe.edu.tr/~ssen/files/papers/Survey_IDSusingEC.pdf",
-
URL = "https://shop.elsevier.com/books/bio-inspired-computation-in-telecommunications/yang/978-0-12-801538-4",
-
URL = "http://www.sciencedirect.com/science/article/pii/B9780128015384000045",
-
DOI = "doi:10.1016/B978-0-12-801538-4.00004-5",
-
size = "24 pages",
-
abstract = "Intrusion detection is an indispensable part of a
security system. Because new attacks are emerging every
day, intrusion detection systems (IDSs) play a key role
in identifying possible attacks to the system and
giving proper responses. IDSs should adapt to these new
attacks and attack strategies, and continuously
improve. How to develop effective, efficient, and
adaptive IDSs is a question that researchers have been
working on for decades. Researchers have been exploring
the suitability of different techniques to this
research domain. The evolutionary computation (EC)
inspired from natural evolution is one of the
approaches increasingly studied. Some characteristics,
such as producing readable outputs for security
experts, producing lightweight solutions, and providing
a set of solutions with different trade-offs between
conflict objectives, make these techniques a promising
candidate for the problem. In this study, we survey the
proposed intrusion detection approaches based on EC
techniques found in the literature. Each major research
area on intrusion detection is investigated thoroughly
from the EC point of view. Possible future research
directions are also summarised for researchers.",
- }
Genetic Programming entries for
Sevil Sen
Citations