An Evolution Strategy Approach toward Rule-set Generation for Network Intrusion Detection Systems (IDS)

12/01/2012
by   Herve Kabamba Mbikayi, et al.
0

With the increasing number of intrusions in system and network infrastructures, Intrusion Detection Systems (IDS) have become an active area of research to develop reliable and effective solutions to detect and counter them. The use of Evolutionary Algorithms in IDS has proved its maturity over the times. Although most of the research works have been based on the use of genetic algorithms in IDS, this paper presents an approach toward the generation of rules for the identification of anomalous connections using evolution strategies . The emphasis is given on how the problem can be modeled into ES primitives and how the fitness of the population can be evaluated in order to find the local optima, therefore resulting in optimal rules that can be used for detecting intrusions in intrusion detection systems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/09/2018

A Taxonomy of Malicious Traffic for Intrusion Detection Systems

With the increasing number of network threats it is essential to have a ...
research
03/07/2014

Continuous Features Discretization for Anomaly Intrusion Detectors Generation

Network security is a growing issue, with the evolution of computer syst...
research
06/16/2018

Detecting intrusions in control systems: a rule of thumb, its justification and illustrations

Control systems are exposed to unintentional errors, deliberate intrusio...
research
04/05/2012

An Implementation of Intrusion Detection System Using Genetic Algorithm

Nowadays it is very important to maintain a high level security to ensur...
research
03/28/2019

Extending Signature-based Intrusion Detection Systems WithBayesian Abductive Reasoning

Evolving cybersecurity threats are a persistent challenge for systemadmi...
research
04/15/2020

A New Intrusion Detection System using the Improved Dendritic Cell Algorithm

The Dendritic Cell Algorithm (DCA) as one of the emerging evolutionary a...
research
11/15/2021

Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments

Artifacts such as log data and network traffic are fundamental for cyber...

Please sign up or login with your details

Forgot password? Click here to reset