메뉴 건너뛰기




Volumn 36, Issue 4, 2012, Pages 347-357

Artificial immune system inspired intrusion detection system using genetic algorithm

Author keywords

Artificial immune system; Genetic algorithm; Intrusion detection; Minkowski distance

Indexed keywords

ANOMALOUS ACTIVITY; ARTIFICIAL IMMUNE SYSTEM; DATA SETS; DETECTION PROCESS; DETECTION RATES; EUCLIDEAN DISTANCE; INTRUSION DETECTION SYSTEMS; MINKOWSKI DISTANCE; MINKOWSKI DISTANCE FUNCTION; NETWORK RESOURCE;

EID: 84871857021     PISSN: 03505596     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (26)

References (34)
  • 2
    • 0036613083 scopus 로고    scopus 로고
    • An immunity-based technique to characterize intrusions in computer networks
    • DOI 10.1109/TEVC.2002.1011541, PII S1089778X02060666
    • Fabio A. Gonzalez and Dipankar Dasgupta (2002) An Immunity-based Technique to Characterize Intrusions in Computer Network, IEEE Transactions on Evolutionary Computation, Vol. 6(3), pp. 281-291. (Pubitemid 34867250)
    • (2002) IEEE Transactions on Evolutionary Computation , vol.6 , Issue.3 , pp. 281-291
    • Dasgupta, D.1    Gonzalez, F.2
  • 3
    • 0037781389 scopus 로고    scopus 로고
    • An immunogenetic technique to detect anomalies in network traffic proceedings of the genetic and evolutionary computation conference
    • Morgan Kaufman
    • Fabio A. Gonzalez and Dipankar Dasgupta, (2002) An Immunogenetic Technique to Detect Anomalies in Network Traffic Proceedings of the Genetic and Evolutionary Computation Conference, GECCO, Morgan Kaufman, pp. 1081-1088.
    • (2002) GECCO , pp. 1081-1088
    • Gonzalez, F.A.1    Dasgupta, D.2
  • 4
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: A brief history and overview
    • R. A. Kemmerer and G. Vigna (2002) Intrusion Detection: A Brief History and Overview, IEEE Computer, Vol. 1(1), pp. 27-30.
    • (2002) IEEE Computer , vol.1 , Issue.1 , pp. 27-30
    • Kemmerer, R.A.1    Vigna, G.2
  • 6
    • 77957914118 scopus 로고    scopus 로고
    • A cooperative immunological approach for detecting network anomaly
    • Elsevier
    • Tarek S. Sobh and Wael M. Mostafa (2011) A cooperative immunological approach for detecting network anomaly", Applied Soft Computing, Elsevier, Vol. 11(1), pp. 1275-1283.
    • (2011) Applied Soft Computing , vol.11 , Issue.1 , pp. 1275-1283
    • Sobh, T.S.1    Mostafa, W.M.2
  • 7
    • 57849130705 scopus 로고    scopus 로고
    • Anomaly-based network intrusion detection: Techniques, systems and challenges
    • Elsevier
    • P. Garcia Teodorro, J. Diaz-Verdejo, G. Marcia-Fernandez, E. Vazquez (2009) Anomaly-based network intrusion detection: Techniques, systems and challenges, Computers and Security, Elsevier, Vol. 28(1-2), pp. 18-28.
    • (2009) Computers and Security , vol.28 , Issue.1-2 , pp. 18-28
    • Garcia Teodorro, P.1    Diaz-Verdejo, J.2    Marcia-Fernandez, G.3    Vazquez, E.4
  • 9
    • 70350134739 scopus 로고    scopus 로고
    • The use of computational intelligence in intrusion detection systems: A review
    • S. X. Wu and W. Banzhaf (2010) The use of computational intelligence in intrusion detection systems: A review, Applied Soft Computing, Vol. 10, pp. 1-35.
    • (2010) Applied Soft Computing , vol.10 , pp. 1-35
    • Wu, S.X.1    Banzhaf, W.2
  • 11
    • 33846309260 scopus 로고    scopus 로고
    • Advances in artificial immune systems
    • Dipanker Dasgupta (2006) Advances in Artificial Immune Systems, IEEE Computational Intelligence Magazine, Vol. 1(4), pp. 40-49.
    • (2006) IEEE Computational Intelligence Magazine , vol.1 , Issue.4 , pp. 40-49
    • Dasgupta, D.1
  • 17
    • 4344588856 scopus 로고    scopus 로고
    • Detecting new forms of network intrusion using genetic programming
    • Wei Li and Issa Traore (2004) Detecting New Forms of Network Intrusion Using Genetic Programming", Computational Intelligence, Vol. 20(3), pp. 475-494.
    • (2004) Computational Intelligence , vol.20 , Issue.3 , pp. 475-494
    • Li, W.1    Traore, I.2
  • 20
    • 84871887920 scopus 로고    scopus 로고
    • McFadden, MBI 640 Data Communications & Network Security, Northern Kentucky University
    • McFadden (2008) Genetic Algorithms and Network Intrusion Detection", MBI 640 Data Communications & Network Security, Northern Kentucky University.
    • (2008) Genetic Algorithms and Network Intrusion Detection"
  • 21
    • 84871859918 scopus 로고    scopus 로고
    • An intelligent intrusion detection system using genetic algorithms and feature selection
    • Hossein M. Shirazi and Kalaji Y (2010) An Intelligent Intrusion Detection System Using Genetic Algorithms and Feature Selection", Majlesi Journal of Electrical Engineering, Vol. 4, No. 1, pp. 33-37.
    • (2010) Majlesi Journal of Electrical Engineering , vol.4 , Issue.1 , pp. 33-37
    • Shirazi, H.M.1    Kalaji, Y.2
  • 22
    • 79952226834 scopus 로고    scopus 로고
    • Hybrid neural network intrusion detection system using genetic algorithm, multimedia technology (ICMT)
    • Fan Li (2010) Hybrid Neural Network Intrusion Detection System Using Genetic Algorithm, Multimedia Technology (ICMT), International Conference, pp. 1-4.
    • (2010) International Conference , pp. 1-4
    • Li, F.1
  • 23
    • 84871879955 scopus 로고    scopus 로고
    • Rule based network intrusion detection using genetic algorithm
    • Published by Foundation of Computer Science
    • Sadiq Ali M Khan. (2011) Rule based Network Intrusion Detection using Genetic Algorithm, International Journal of Computer Applications, Vol. 18, Np. 8, pp. 26-29, Published by Foundation of Computer Science.
    • (2011) International Journal of Computer Applications , vol.18 , Issue.8 , pp. 26-29
    • Khan, S.A.M.1
  • 25
    • 84871890517 scopus 로고    scopus 로고
    • Fitness function for genetic algorithm used in intrusion detection system
    • Alabsi, F. and Naoum, R. (2012) Fitness Function for Genetic Algorithm used in Intrusion Detection System". International Journal of Applied Science and Technology, Vol. 2, No. 4, pp. 129-134.
    • (2012) International Journal of Applied Science and Technology , vol.2 , Issue.4 , pp. 129-134
    • Alabsi, F.1    Naoum, R.2
  • 28
    • 84872528482 scopus 로고    scopus 로고
    • Detectors generation using genetic algorithm for a negative selection inspired anomaly network intrusion detection system
    • Wroclaw, Poland, ISBN 978-83-60810-51-4
    • Amira Sayed A. Aziz, Mostafa Salama, Aboul Ella Hassanien, Sanaa EL-Ola Hanafi (2012) Detectors Generation using Genetic Algorithm for a Negative Selection Inspired Anomaly Network Intrusion Detection System", In proceeding of: IEEE Fed CSIS, At Wroclaw, Poland, pp. 625-631, ISBN 978-83-60810-51-4.
    • (2012) Proceeding Of: IEEE Fed CSIS , pp. 625-631
    • Aziz, A.S.A.1    Salama, M.2    Ella Hassanien, A.3    El-Ola Hanafi, S.4
  • 29
    • 53349090793 scopus 로고    scopus 로고
    • The crowding approach to niching in genetic algorithms
    • MIT Press Cambridge
    • Ole Mengshoel and David E. Goldberg (2008) The Crowding Approach to Niching in Genetic Algorithms, Evolutionary Computation, MIT Press Cambridge, Vol. 16(3), pp. 315-354.
    • (2008) Evolutionary Computation , vol.16 , Issue.3 , pp. 315-354
    • Mengshoel, O.1    Goldberg, D.E.2
  • 32
    • 84871898161 scopus 로고    scopus 로고
    • NSL-KDD data set, http://nsl.cs.unb.ca/NSL-KDD


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.