Evolutive modeling of TCP/IP network traffic for intrusion detection

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The detection of intrusions over computer networks can be cast to the task of detecting anomalous patterns of network Traffic. In this case, patterns of normal Traffic have to be determined and compared against the current network Traffic. Data mining systems based on Genetic Algorithms can contribute powerful search techniques for the acquisition of patterns of the network Traffic from the large amount of data made available by audit tools. In this paper we compare models of data Traffic acquired by a system based on a distributed genetic algorithm with the ones acquired by a system based on greedy heuristics. Also we discuss representation change of the network data and its impact over the performances of the Traffic models.

Cite

CITATION STYLE

APA

Neri, F. (2000). Evolutive modeling of TCP/IP network traffic for intrusion detection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1803, pp. 214–223). Springer Verlag. https://doi.org/10.1007/3-540-45561-2_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free