BS Dhak, S Lade - International Journal of Emerging Technology and …, 2012 - Citeseer
… of applying evolutionaryalgorithm ie Genetic Algorithm to IntrusionDetection System. It also … packet on the network and ultimately helps to block the respective IPaddresses. Genetic …
HK Mbikayi - arXiv preprint arXiv:1212.0170, 2012 - arxiv.org
… related to the application of evolutionaryalgorithms in intrusiondetection. … IDS using only six attributes which are the source range of IPaddresses, the destination range of IPaddresses …
… to development of Evolutionary Programming Algorithms that … branches inspired by evolution and behavioural patterns in … Some IPs are more probable targets for intrusions such as …
O Folorunso, OO Akande… - Computer and …, 2010 - pdfs.semanticscholar.org
… The condition refers to a match between current network connection and the rules in IDS such as source and destination, IPaddresses and port numbers used in TCP/IP network …
… for intrusiondetection using differential evolution. In this paper, we will adapt differential evolutionalgorithm for … , such as brute force pinging of IPaddresses and testing of open ports by …
X Wang, X Wang, L Jin, R Lv, B Dai, M He, T Lv - IEEE Access, 2021 - ieeexplore.ieee.org
… The authors extracted 14 flow-based features including source and destination IPaddresses… an intrusiondetection system based on DL using a recurrent neural network (RNNIDS). The …
… and 255) represent a set of IPaddresses, the fifth one represents the … evolutionaryalgorithm, which we then used in all later experiments. The performance of our evolutionaryalgorithm …
… DE is a prominent evolutionaryalgorithm that was proposed … Similar to evolutionaryalgorithms (EA), DE uses crossover, … IDS in this study was created using the Differential Evolution (…
… , Evolutionary Computation (EC) algorithms are empirically investigated for synthesising intrusiondetection … popular Pareto-based evolutionaryalgorithms, is utilised in this research. …