[PDF][PDF] Network Intrusion Detection Using Danger Theory and Genetic Algorithms.
JL Santanelli, FB de Lima Neto - ISDA, 2016 - mirlabs.net
One of the most concerning problems faced by practitioners, within the development and
operation of IT communication networks, is the crescent number of network intrusion
attempts. That kind of attacks compromise the integrity of several services provided through
the Internet. This paper presents a technique capable of optimize Danger Theorybased
Intrusion Detection Systems through the use of a Genetic Algorithms. To validate the
approach, tests were performed on the KDD Cup 1999 database, provided by the University …
operation of IT communication networks, is the crescent number of network intrusion
attempts. That kind of attacks compromise the integrity of several services provided through
the Internet. This paper presents a technique capable of optimize Danger Theorybased
Intrusion Detection Systems through the use of a Genetic Algorithms. To validate the
approach, tests were performed on the KDD Cup 1999 database, provided by the University …
Network intrusion detection using danger theory and genetic algorithms
J Lima Santanelli, FB de Lima Neto - … and Applications (ISDA 2016) held in …, 2017 - Springer
One of the most concerning problems faced by practitioners, within the development and
operation of IT communication networks, is the crescent number of network intrusion
attempts. That kind of attacks compromise the integrity of several services provided through
the Internet. This paper presents a technique capable of optimize Danger Theory-based
Intrusion Detection Systems through the use of a Genetic Algorithms. To validate the
approach, tests were performed on the KDD Cup 1999 database, provided by the University …
operation of IT communication networks, is the crescent number of network intrusion
attempts. That kind of attacks compromise the integrity of several services provided through
the Internet. This paper presents a technique capable of optimize Danger Theory-based
Intrusion Detection Systems through the use of a Genetic Algorithms. To validate the
approach, tests were performed on the KDD Cup 1999 database, provided by the University …
Showing the best results for this search. See all results