Evolving Non-cryptographic Hash Functions Using Genetic Programming for High-speed Lookups in Network Security Applications.
Mujtaba HassanArish SateesanJo VliegenStjepan PicekNele MentensPublished in: EvoApplications@EvoStar (2013)
Keyphrases
- hash functions
- network security
- high speed
- intrusion detection
- computer networks
- content addressable memory
- intrusion detection system
- similarity search
- traffic analysis
- security policies
- locality sensitive
- network traffic
- information security
- locality sensitive hashing
- dos attacks
- risk assessment
- situation assessment
- hamming distance
- data distribution
- network administrators
- real time
- anti phishing
- encryption scheme
- anomaly detection
- stream cipher
- data analysis
- signature scheme
- pattern recognition
- secure communication
- learning algorithm
- hamming space
- databases