[go: up one dir, main page]

Naoum et al., 2014 - Google Patents

An enhancement of the replacement steady state genetic algorithm for intrusion detection

Naoum et al., 2014

View PDF
Document ID
7860502519589642236
Author
Naoum R
Aziz S
Alabsi F
Publication year
Publication venue
International Journal of Advanced Computer Research

External Links

Snippet

In these days, Internet and computer systems face many intrusions, thus for this purpose we need to build a detection or prevention security system. Intrusion Detection System (IDS) is a system used to detect attacks, Steady State Genetic Algorithm (SSGA) is applied to support …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
Mehmood et al. Privilege escalation attack detection and mitigation in cloud using machine learning
Iqbal et al. A feed-forward and pattern recognition ANN model for network intrusion detection
Alsajri et al. Intrusion detection system based on machine learning algorithms:(SVM and genetic algorithm)
Kumar et al. Network attack detection using an unsupervised machine learning algorithm
Naoum et al. An enhancement of the replacement steady state genetic algorithm for intrusion detection
Grover et al. A review on block chain and data mining based data security methods
Thirupathi et al. Integration of AI and quantum computing in cyber security
Niranjan et al. Security in data mining-a comprehensive survey
Jain et al. A Comparative Study on Cyber security Technology in Big data Cloud Computing Environment
Khan et al. AI-powered detection and mitigation of backdoor attacks on databases server
Rani et al. Leveraging artificial intelligence and machine learning for enhanced privacy and security
Rohatgi et al. Introduction to artificial intelligence and cybersecurity for industry
Sivasankar The review of artificial intelligence in cyber security
Kumar et al. Intrusion detection using soft computing techniques
George Artificial Intelligence-Powered Cybersecurity: The Future of How Threats Are Detected and Responded
Vats et al. Unveiling crypto analysis secrets: A comprehensive analysis of smart contract security within blockchain network environments
Kabanda A bayesian network model for machine learning and cyber security
Anand et al. A comprehensive study of DDoS attack on internet of things network
Beltrano et al. Deep learning-based detection of csrf vulnerabilities in web applications
Nweke et al. Methods, Potentials and Challenges of Machine Learning Based Artificial Intelligence Systems in Cyber Security
Sun et al. Proactive defense of insider threats through authorization management
Toapanta et al. Prototype to Mitigate the Risks, Vulnerabilities and Threats of Information to Ensure Data Integrity
Arhore Intrusion detection in iot systems using machine learning
Shekhawat A Multi-Objective Hyper-Heuristic Improved Configuration of Svm Based on Particle Swarm Optimization for Big Data Cyber Security
Makka et al. A Structured Investigation of Network Security Strategies and its Applications