The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …

Self-healing systems—survey and synthesis

D Ghosh, R Sharman, HR Rao, S Upadhyaya - Decision support systems, 2007 - Elsevier
As modern software-based systems and applications gain in versatility and functionality, the
ability to manage inconsistent resources and service disparate user requirements becomes …

人工免疫系统: 原理, 模型, 分析及展望

肖人彬, 王磊 - 计算机学报, 2002 - cqvip.com
目前, 受生物免疫系统启发而产生的人工免疫系统(Artificial Immune System, AIS) 正在兴起,
它作为计算智能研究的新领域, 提供了一种强大的信息处理和问题求解范式. 该文侧重以AIS …

[图书][B] Computational intelligence: an introduction

AP Engelbrecht - 2007 - books.google.com
Computational Intelligence: An Introduction, Second Edition offers an in-depth exploration
into the adaptive mechanisms that enable intelligent behaviour in complex and changing …

A survey of clustering data mining techniques

P Berkhin - Grouping multidimensional data: Recent advances in …, 2006 - Springer
Clustering is the division of data into groups of similar objects. In clustering, some details are
disregarded in exchange for data simplification. Clustering can be viewed as a data …

A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns

G Creech, J Hu - IEEE Transactions on Computers, 2013 - ieeexplore.ieee.org
Host-based anomaly intrusion detection system design is very challenging due to the
notoriously high false alarm rate. This paper introduces a new host-based anomaly intrusion …

Intrusion detection using sequences of system calls

SA Hofmeyr, S Forrest… - Journal of computer …, 1998 - content.iospress.com
A method is introduced for detecting intrusions at the level of privileged processes. Evidence
is given that short sequences of system calls executed by running processes are a good …

Use of k-nearest neighbor classifier for intrusion detection

Y Liao, VR Vemuri - Computers & security, 2002 - Elsevier
A new approach, based on the k-Nearest Neighbor (kNN) classifier, is used to classify
program behavior as normal or intrusive. Program behavior, in turn, is represented by …

Generation of a new IDS test dataset: Time to retire the KDD collection

G Creech, J Hu - 2013 IEEE wireless communications and …, 2013 - ieeexplore.ieee.org
Intrusion detection systems are generally tested using datasets compiled at the end of last
century, justified by the need for publicly available test data and the lack of any other …

Towards a taxonomy of intrusion-detection systems

H Debar, M Dacier, A Wespi - Computer networks, 1999 - Elsevier
Intrusion-detection systems aim at detecting attacks against computer systems and
networks, or against information systems in general, as it is difficult to provide provably …