An evolutionary algorithm to generate ellipsoid network intrusion detectors.
Joseph M. ShapiroGary B. LamontGilbert L. PetersonPublished in: GECCO Workshops (2005)
Keyphrases
- evolutionary algorithm
- network intrusion
- network intrusion detection
- intrusion detection
- network security
- multi objective
- function optimization
- object detection
- anomaly detection
- differential evolution
- network intrusion detection systems
- fraud detection
- multi objective optimization
- network traffic
- genetic algorithm
- intrusion detection system
- neural network
- reinforcement learning
- crossover operator
- information systems
- databases
- database