Black hole detection using evolutionary algorithm for IDS/IPS in MANETs

R Thanuja, A Umamakeswari - cluster computing, 2019 - Springer
… The IDS acquires input from the anticipated HPSO-GA Algorithm and it classified the variety
of attack. If a spiteful node is identified, then IDS method is triggered by locating the node …

[PDF][PDF] An evolutionary approach to intrusion detection system using genetic algorithm

BS Dhak, S Lade - International Journal of Emerging Technology and …, 2012 - Citeseer
… of applying evolutionary algorithm ie Genetic Algorithm to Intrusion Detection System. It also
… packet on the network and ultimately helps to block the respective IP addresses. Genetic …

An evolution strategy approach toward rule-set generation for network intrusion detection systems (ids)

HK Mbikayi - arXiv preprint arXiv:1212.0170, 2012 - arxiv.org
… related to the application of evolutionary algorithms in intrusion detection. … IDS using only
six attributes which are the source range of IP addresses, the destination range of IP addresses

[PDF][PDF] Genetic algorithm rule-based intrusion detection system (GAIDS)

AA Ojugo, AO Eboka, O Okonta, R Yoro… - Journal of Emerging …, 2012 - researchgate.net
… to development of Evolutionary Programming Algorithms that … branches inspired by evolution
and behavioural patterns in … Some IPs are more probable targets for intrusions such as …

[PDF][PDF] Id-somga: A self organising migrating genetic algorithm-based solution for intrusion detection

O Folorunso, OO Akande… - Computer and …, 2010 - pdfs.semanticscholar.org
… The condition refers to a match between current network connection and the rules in IDS
such as source and destination, IP addresses and port numbers used in TCP/IP network …

Evaluating the performance of a differential evolution algorithm in anomaly detection

S Elsayed, R Sarker, J Slay - … IEEE Congress on Evolutionary …, 2015 - ieeexplore.ieee.org
… for intrusion detection using differential evolution. In this paper, we will adapt differential
evolution algorithm for … , such as brute force pinging of IP addresses and testing of open ports by …

Evolutionary algorithm-based and network architecture search-enabled multiobjective traffic classification

X Wang, X Wang, L Jin, R Lv, B Dai, M He, T Lv - IEEE Access, 2021 - ieeexplore.ieee.org
… The authors extracted 14 flow-based features including source and destination IP addresses
an intrusion detection system based on DL using a recurrent neural network (RNNIDS). The …

Evolving statistical rulesets for network intrusion detection

S Rastegari, P Hingston, CP Lam - Applied soft computing, 2015 - Elsevier
… and 255) represent a set of IP addresses, the fifth one represents the … evolutionary algorithm,
which we then used in all later experiments. The performance of our evolutionary algorithm

[HTML][HTML] A differential evolution-based algorithm with maturity extension for feature selection in intrusion detection system

M Faris, MN Mahmud, MFM Salleh… - Alexandria Engineering …, 2023 - Elsevier
… DE is a prominent evolutionary algorithm that was proposed … Similar to evolutionary algorithms
(EA), DE uses crossover, … IDS in this study was created using the Differential Evolution (…

Developing Efficient and Effective Intrusion Detection System using Evolutionary Computation

H Alyasiri - 2018 - etheses.whiterose.ac.uk
… , Evolutionary Computation (EC) algorithms are empirically investigated for synthesising
intrusion detection … popular Pareto-based evolutionary algorithms, is utilised in this research. …