Efficient Snort Rule Generation Using Evolutionary Computing for Network Intrusion Detection.
Raghavan MuthuregunathanS. SiddharthR. SrivathsanS. R. RajeshPublished in: CICSyN (2009)
Keyphrases
- network intrusion detection
- rule generation
- evolutionary computing
- intrusion detection
- anomaly detection
- intrusion detection system
- fraud detection
- network traffic
- genetic programming
- rule base
- network attacks
- fuzzy systems
- evolutionary computation
- computational intelligence
- association rules
- genetic algorithm
- computer networks
- soft computing
- particle swarm optimization
- multi objective
- artificial immune system
- learning algorithm
- real world