Misuse detection - A neural network vs. a genetic algorithm approach

被引:0
|
作者
Diaz-Gomez, Pedro A. [1 ]
Hougen, Dean F. [1 ]
机构
[1] Univ Oklahoma, Sch Comp Sci, REAL Lab, Norman, OK 73019 USA
关键词
misuse detection; genetic algorithms; neural networks; false negative; false positive;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Misuse detection can be addressed as an optimization problem, where the problem is to find an array of possible intrusions x that maximizes a function f(.) subject to a constraint r imposed by a user's actions performed on a computer. This position paper presents and compares two ways of finding x, in audit data, by using neural networks and genetic algorithms.
引用
收藏
页码:459 / 462
页数:4
相关论文
共 50 条
  • [1] Misuse detection - An iterative process vs. a genetic algorithm approach
    Diaz-Gomez, Pedro A.
    Hougen, Dean F.
    [J]. ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2007, : 455 - 458
  • [2] An approach to network misuse detection based on extension matrix and genetic algorithm
    Chen, Zhixian
    Zhang, Shunyi
    [J]. PROCEEDINGS OF THE FIFTH IEEE INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS, VOLS 1 AND 2, 2006, : 107 - 113
  • [4] Neural Network & Genetic Algorithm Based Approach to Network Intrusion Detection & Comparative Analysis of Performance
    Pal, Biprodip
    Hasan, Md. Al Mehedi
    [J]. 2012 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT), 2012, : 9 - 14
  • [5] A Genetic Algorithm approach for doing misuse detection in audit trail files
    Diaz-Gomez, Pedro A.
    Hougen, Dean F.
    [J]. CIC 2006: 15TH INTERNATIONAL CONFERENCE ON COMPUTING, PROCEEDINGS, 2006, : 329 - +
  • [6] Network Intrusion Detection Using Genetic Algorithm and Neural Network
    Gomathy, A.
    Lakshmipathi, B.
    [J]. ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, 2011, 198 : 399 - 408
  • [7] A Genetic Algorithm-Neural Network Wrapper Approach for Bundle Branch Block Detection
    Allami, Ragheed
    Stranieri, Andrew
    Balasubramanian, Venki
    Jelinek, Herbert F.
    [J]. 2016 COMPUTING IN CARDIOLOGY CONFERENCE (CINC), VOL 43, 2016, 43 : 461 - 464
  • [8] GAS TURBINE ENGINE OPERATIONAL DATA ANALYSIS FOR ANOMALY DETECTION: STATISTICAL VS. NEURAL NETWORK APPROACH
    Kumar, Amar
    Banerjee, Avisekh
    Srivastava, Alka
    Goel, Nita
    Goel, Alok
    [J]. 2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2013, : 680 - 684
  • [9] SVM approach with a genetic algorithm for network intrusion detection
    Shon, T
    Seo, J
    Moon, J
    [J]. COMPUTER AND INFORMATION SCIENCES - ISCIS 2005, PROCEEDINGS, 2005, 3733 : 224 - 233
  • [10] A Cooperative Outage Detection Approach Using an Improved RBF Neural Network with Genetic ABC Algorithm
    Wang, Yuting
    Long, Peng
    Liu, Nan
    Pan, Zhiwen
    You, Xiaohu
    [J]. 2018 10TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2018,