Because malicious intrusions into critical information infrastructures are essential to the success of cyberterrorists, effective intrusion detection is also essential for defending such infrastructures. Cyberterrorism thrives on the development of new technologies; and, in response, intrusion detection methods must be robust and adaptive, as well as efficient. We hypothesize that genetic programming algorithms can aid in this endeavor. To investigate this proposition, we conducted an experiment using a very large dataset from the 1999 Knowledge Discovery in Database (KDD) Cup data, supplied by the Defense Advanced Research Projects Agency (DARPA) and MIT's Lincoln Laboratories. Using machine-coded linear genomes and a homologous crossover ...
Abstract- How to find and detect novel o r unknown network attacks is one of the most important obje...
The widespread connectivity of computers all over the world has encouraged intruders to threaten the...
Proceeding of: International Conference on Availability, Reliability, and Security, 2010. ARES '10...
Abstract. An ever-present problem in intrusion detection technology is how to construct the patterns...
Abstract—One of the central areas in network intrusion detection is how to build effective systems t...
Proceeding of: EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoI...
Proceeding of: EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoI...
Intrusion detection is the process of monitoring the events occurring in a computer system or netwo...
Intrusion Detection System (IDS) is one of the key security components in today’s networking environ...
Proceeding of: International Conference on Availability, Reliability, and Security, 2010. ARES '10...
Proceeding of: International Conference on Availability, Reliability, and Security, 2010. ARES '10...
Proceeding of: EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoI...
Proceeding of: EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoI...
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Common...
Proceeding of: EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoI...
Abstract- How to find and detect novel o r unknown network attacks is one of the most important obje...
The widespread connectivity of computers all over the world has encouraged intruders to threaten the...
Proceeding of: International Conference on Availability, Reliability, and Security, 2010. ARES '10...
Abstract. An ever-present problem in intrusion detection technology is how to construct the patterns...
Abstract—One of the central areas in network intrusion detection is how to build effective systems t...
Proceeding of: EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoI...
Proceeding of: EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoI...
Intrusion detection is the process of monitoring the events occurring in a computer system or netwo...
Intrusion Detection System (IDS) is one of the key security components in today’s networking environ...
Proceeding of: International Conference on Availability, Reliability, and Security, 2010. ARES '10...
Proceeding of: International Conference on Availability, Reliability, and Security, 2010. ARES '10...
Proceeding of: EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoI...
Proceeding of: EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoI...
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Common...
Proceeding of: EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoI...
Abstract- How to find and detect novel o r unknown network attacks is one of the most important obje...
The widespread connectivity of computers all over the world has encouraged intruders to threaten the...
Proceeding of: International Conference on Availability, Reliability, and Security, 2010. ARES '10...