Estimation of distribution algorithm for optimization of neural networks for intrusion detection system

被引:0
|
作者
Chen, Yuehui [1 ]
Zhang, Yong
Abraham, Ajith
机构
[1] Jinan Univ, Sch Informat Sci & Engn, Jinan 250022, Peoples R China
[2] Jinan Univ, Sch Control Sci & Engn, Jinan 250022, Peoples R China
[3] Chung Ang Univ, Sch Comp Sci & Engn, Seoul 156756, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. An IDS does not eliminate the use of preventive mechanism but it works as the last defensive mechanism in securing the system. This paper evaluates the performances of Estimation of Distribution Algorithm (EDA) to train a feed-forward neural network classifier for detecting intrusions in a network. Results are then compared with Particle Swarm Optimization (PSO) based neural classifier and Decision Trees (DT). Empirical results clearly show that evolutionary computing techniques could play an important role in designing real time intrusion detection systems.
引用
收藏
页码:9 / 18
页数:10
相关论文
共 50 条
  • [1] Optimizing neural networks using spider monkey optimization algorithm for intrusion detection system
    Kumari, Deepshikha
    Sinha, Abhinav
    Dutta, Sandip
    Pranav, Prashant
    [J]. SCIENTIFIC REPORTS, 2024, 14 (01):
  • [2] Optimization of Neural Networks for Network Intrusion Detection
    Wang, Huiran
    Ma, Ruifang
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL I, 2009, : 418 - +
  • [3] Optimization of Intrusion Detection System Based on Improved Convolutional Neural Network Algorithm
    Pu, Xiaochuan
    Zhang, Yuanqiang
    Ruan, Qingqiang
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [4] Anomaly intrusion detection for system call using the Soundex algorithm and neural networks
    Cha, BR
    Vaidya, B
    Han, S
    [J]. 10TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2005, : 427 - 433
  • [5] Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm
    Hajimirzaei, Bahram
    Navimipour, Nima Jafari
    [J]. ICT EXPRESS, 2019, 5 (01): : 56 - 59
  • [6] Intrusion Detection System in Ad Hoc Networks with Neural Networks Artificial and K-Means Algorithm
    Canedo, D.
    Romariz, A.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2019, 17 (07) : 1109 - 1115
  • [7] The Affect of Fuzzification on Neural Networks Intrusion Detection System
    Ali, Khattab M.
    Venus, W.
    Al Rababaa, Mamoun Suleiman
    [J]. ICIEA: 2009 4TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-6, 2009, : 1227 - +
  • [8] APPLICATION OF ARTIFICIAL NEURAL NETWORKS IN THE INTRUSION DETECTION SYSTEM
    Mustafaev, Arslan G.
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2018, 10 (04): : 57 - 66
  • [9] Network Intrusion Detection System Using Neural Networks
    Shum, Jimmy
    Malki, Heidar A.
    [J]. ICNC 2008: FOURTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 5, PROCEEDINGS, 2008, : 242 - 246
  • [10] Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks
    Ghanem, Waheed Ali H. M.
    Ghaleb, Sanaa Abduljabbar Ahmed
    Jantan, Aman
    Nasser, Abdullah B.
    Saleh, Sami Abdulla Mohsen
    Ngah, Amir
    Alhadi, Arifah Che
    Arshad, Humaira
    Saad, Abdul-Malik H. Y.
    Omolara, Abiodun Esther
    El-Ebiary, Yousef A. Baker
    Abiodun, Oludare Isaac
    [J]. IEEE ACCESS, 2022, 10 : 76318 - 76339