Comparison study of evolutionary flexible neural networks for Intrusion Detection System
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Y. | - |
dc.contributor.author | Zhang, L. | - |
dc.contributor.author | Abraham, A. | - |
dc.date.accessioned | 2021-06-18T13:42:38Z | - |
dc.date.available | 2021-06-18T13:42:38Z | - |
dc.date.issued | 2006-07 | - |
dc.identifier.issn | 1790-0832 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/47054 | - |
dc.description.abstract | An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. An IDS does not eliminate the use of preventive mechanism but it works as the last defensive mechanism in securing the system. This paper evaluates the performances of flexible neural networks and flexible neural tree trained by recent various evolutionary algorithms, i.e., Estimation of Distribution Algorithm (EDA), Particle Swarm Optimization (PSO) and Differential Evolution (DE) for detecting intrusions in a network. Results are then compared with Decision Trees (DT) classifier. Empirical results clearly show that evolutionary computing and neural networks techniques could play an important role in designing real time intrusion detection systems. | - |
dc.format.extent | 9 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.title | Comparison study of evolutionary flexible neural networks for Intrusion Detection System | - |
dc.type | Article | - |
dc.identifier.bibliographicCitation | WSEAS Transactions on Information Science and Applications, v.3, no.7, pp 1332 - 1340 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-33744541670 | - |
dc.citation.endPage | 1340 | - |
dc.citation.number | 7 | - |
dc.citation.startPage | 1332 | - |
dc.citation.title | WSEAS Transactions on Information Science and Applications | - |
dc.citation.volume | 3 | - |
dc.type.docType | Article | - |
dc.publisher.location | 그리이스 | - |
dc.subject.keywordAuthor | Decision tree | - |
dc.subject.keywordAuthor | Differential evolution | - |
dc.subject.keywordAuthor | Estimation of distribution algorithm | - |
dc.subject.keywordAuthor | Flexible neural networks | - |
dc.subject.keywordAuthor | Flexible neural tree | - |
dc.subject.keywordAuthor | Intrusion detection systems | - |
dc.subject.keywordAuthor | Particle swarm optimization | - |
dc.subject.keywordPlus | Decision theory | - |
dc.subject.keywordPlus | Evolutionary algorithms | - |
dc.subject.keywordPlus | Learning systems | - |
dc.subject.keywordPlus | Optimization | - |
dc.subject.keywordPlus | Real time systems | - |
dc.subject.keywordPlus | Trees (mathematics) | - |
dc.subject.keywordPlus | Decision tree | - |
dc.subject.keywordPlus | Differential Evolution | - |
dc.subject.keywordPlus | Evolutionary flexible neural network | - |
dc.subject.keywordPlus | Intrusion Detection System | - |
dc.subject.keywordPlus | Particle Swarm Optimization | - |
dc.subject.keywordPlus | Neural networks | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
84, Heukseok-ro, Dongjak-gu, Seoul, Republic of Korea (06974)02-820-6194
COPYRIGHT 2019 Chung-Ang University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.