Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams.
Gerry V. DozierDouglas BrownJohn HurleyKrystal CainPublished in: IEEE Congress on Evolutionary Computation (2004)
Keyphrases
- particle swarm
- intrusion detection system
- intrusion detection
- genetic algorithm
- particle swarm optimization
- network security
- particle swarm algorithm
- particle swarm optimization algorithm
- optimization method
- swarm intelligence
- computer networks
- anomaly detection
- network traffic
- fitness function
- multi objective
- network intrusion detection
- evolutionary algorithm
- differential evolution
- distributed intrusion detection
- optimization methods
- alert correlation
- hybrid algorithm
- computer security
- computer systems
- cyber security
- pso algorithm
- intrusion prevention
- network intrusion detection systems
- evolutionary computation
- hybrid optimization algorithm
- attack detection
- convergence speed
- cyber attacks
- network intrusion
- artificial intelligence
- databases
- optimization algorithm
- security architecture
- simulated annealing
- normal behavior
- genetic programming
- objective function
- association rules