Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection.
James V. HansenPaul Benjamin LowryRayman D. MeservyDaniel M. McDonaldPublished in: Decis. Support Syst. (2007)
Keyphrases
- intrusion detection
- genetic programming
- intrusion detection system
- anomaly detection
- network traffic
- network security
- network intrusion detection
- distributed intrusion detection
- artificial immune
- information security
- cyber security
- detecting anomalous
- data mining
- network intrusion
- computer security
- databases
- fraud detection
- evolutionary algorithm
- information systems
- network attacks
- false positives and false negatives
- database systems
- pairwise
- security vulnerabilities
- alert correlation
- credit card fraud detection
- detection algorithm
- network intrusions
- computational intelligence