Role of swarm and evolutionary algorithms for intrusion detection system: A survey

A Thakkar, R Lohiya - Swarm and evolutionary computation, 2020 - Elsevier
The growth of data and categories of attacks, demand the use of Intrusion Detection System
(IDS) effectively using Machine Learning (ML) and Deep Learning (DL) techniques. Apart …

Intrusion detection systems: Conceptual study and review

C Vij, H Saini - 2021 6th International Conference on Signal …, 2021 - ieeexplore.ieee.org
Recently, the increase in the usage of the internet and digital devices has influenced a lot of
people and it has resulted in the transmission of data on a very large scale. Data …

Network traffic features for anomaly detection in specific industrial control system network

M Mantere, M Sailio, S Noponen - Future Internet, 2013 - mdpi.com
The deterministic and restricted nature of industrial control system networks sets them apart
from more open networks, such as local area networks in office environments. This improves …

A survey of intrusion detection systems using evolutionary computation

S Sen - Bio-inspired computation in telecommunications, 2015 - Elsevier
Intrusion detection is an indispensable part of a security system. Because new attacks are
emerging every day, intrusion detection systems (IDSs) play a key role in identifying …

[PDF][PDF] List of references on evolutionary multiobjective optimization

CAC Coello - URL< http://www. lania. mx/~ ccoello/EMOO …, 2010 - delta.cs.cinvestav.mx
List of References on Evolutionary Multiobjective Optimization Page 1 List of References on
Evolutionary Multiobjective Optimization Carlos A. Coello Coello ccoello@cs.cinvestav.mx …

Comprehensively analyzing the impact of cyberattacks on power grids

L Bader, M Serror, O Lamberts, Ö Sen… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
The increasing digitalization of power grids and especially the shift towards IP-based
communication drastically increase the susceptibility to cyberattacks, potentially leading to …

Using genetic algorithms for deadline-constrained monitor selection in dynamic computer networks

R Mueller-Bady, R Gad, M Kappes… - Proceedings of the …, 2015 - dl.acm.org
In this paper we address the problem of selecting a minimal number of optimally positioned
monitors for capturing network traffic in dynamic computer network environments …

Auditing on smart-grid with dynamic traffic flows: an algorithmic approach

LN Nguyen, JD Smith, J Bae, J Kang… - … on Smart Grid, 2019 - ieeexplore.ieee.org
The introduction of Smart Grid systems has raised many new security concerns. If an
attacker can compromise components of the Smart Grid communication network, they can …

Detection and Hardening Strategies to Secure an Enterprise Network

P Mukherjee, SM Thampi, N Rohith, BK Poddar… - … on Information Systems …, 2023 - Springer
In today's IT enterprises, security strategy determination has become exponentially complex
with the increasing complexity of the network infrastructure. Various types of defenses are …

Feature selection for machine learning based anomaly detection in industrial control system networks

M Mantere, M Sailio, S Noponen - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
The nature of the traffic in industrial control system network is markedly different from more
open networks. Industrial control system networks should be far more restricted in what …