Mining TCP/IP traffic for network intrusion detection by using a distributed genetic algorithm

5Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

Abstract

The detection of intrusions over computer networks (i.e., network access by non-authorized users)c an be cast to the task of detecting anomalous patterns of network traffic. In this case, models of normal traffic have to be determined and compared against the current network traffic. Data mining systems based on Genetic Algorithms can contribute powerful search techniques for the acquisition of patterns of the network traffic from the large amount of data made available by audit tools. We compare models of network traffic acquired by a system based on adistributed genetic algorithm with the ones acquired by a system based on greedy heuristics. Also we discuss representation change of the network data and its impact over the performances of the traffic models. Network data made available from the Information Exploration Shootout project and the 1998 DARPA Intrusion Detection Evaluation have been chosen as experimental testbed.

References Powered by Scopus

An Intrusion-Detection Model

2398Citations
N/AReaders
Get full text

Intrusion detection using sequences of system calls

993Citations
N/AReaders
Get full text

Exploring the power of genetic search in learning symbolic classifiers

40Citations
N/AReaders
Get full text

Cited by Powered by Scopus

The use of computational intelligence in intrusion detection systems: A review

557Citations
N/AReaders
Get full text

Evaluating the performance of a differential evolution algorithm in anomaly detection

24Citations
N/AReaders
Get full text

Survey of Uses of Evolutionary Computation Algorithms and Swarm Intelligence for Network Intrusion Detection

11Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Neri, F. (2000). Mining TCP/IP traffic for network intrusion detection by using a distributed genetic algorithm. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1810, pp. 313–322). Springer Verlag. https://doi.org/10.1007/3-540-45164-1_33

Readers over time

‘10‘11‘12‘13‘14‘15‘17‘18‘19‘21‘2401234

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 13

68%

Professor / Associate Prof. 3

16%

Researcher 2

11%

Lecturer / Post doc 1

5%

Readers' Discipline

Tooltip

Computer Science 16

80%

Engineering 2

10%

Physics and Astronomy 1

5%

Business, Management and Accounting 1

5%

Save time finding and organizing research with Mendeley

Sign up for free
0