Naoum et al., 2014 - Google Patents
An enhancement of the replacement steady state genetic algorithm for intrusion detectionNaoum et al., 2014
View PDF- Document ID
- 7860502519589642236
- Author
- Naoum R
- Aziz S
- Alabsi F
- Publication year
- Publication venue
- International Journal of Advanced Computer Research
External Links
Snippet
In these days, Internet and computer systems face many intrusions, thus for this purpose we need to build a detection or prevention security system. Intrusion Detection System (IDS) is a system used to detect attacks, Steady State Genetic Algorithm (SSGA) is applied to support …
- 238000001514 detection method 0 title abstract description 55
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mehmood et al. | Privilege escalation attack detection and mitigation in cloud using machine learning | |
| Iqbal et al. | A feed-forward and pattern recognition ANN model for network intrusion detection | |
| Alsajri et al. | Intrusion detection system based on machine learning algorithms:(SVM and genetic algorithm) | |
| Kumar et al. | Network attack detection using an unsupervised machine learning algorithm | |
| Naoum et al. | An enhancement of the replacement steady state genetic algorithm for intrusion detection | |
| Grover et al. | A review on block chain and data mining based data security methods | |
| Thirupathi et al. | Integration of AI and quantum computing in cyber security | |
| Niranjan et al. | Security in data mining-a comprehensive survey | |
| Jain et al. | A Comparative Study on Cyber security Technology in Big data Cloud Computing Environment | |
| Khan et al. | AI-powered detection and mitigation of backdoor attacks on databases server | |
| Rani et al. | Leveraging artificial intelligence and machine learning for enhanced privacy and security | |
| Rohatgi et al. | Introduction to artificial intelligence and cybersecurity for industry | |
| Sivasankar | The review of artificial intelligence in cyber security | |
| Kumar et al. | Intrusion detection using soft computing techniques | |
| George | Artificial Intelligence-Powered Cybersecurity: The Future of How Threats Are Detected and Responded | |
| Vats et al. | Unveiling crypto analysis secrets: A comprehensive analysis of smart contract security within blockchain network environments | |
| Kabanda | A bayesian network model for machine learning and cyber security | |
| Anand et al. | A comprehensive study of DDoS attack on internet of things network | |
| Beltrano et al. | Deep learning-based detection of csrf vulnerabilities in web applications | |
| Nweke et al. | Methods, Potentials and Challenges of Machine Learning Based Artificial Intelligence Systems in Cyber Security | |
| Sun et al. | Proactive defense of insider threats through authorization management | |
| Toapanta et al. | Prototype to Mitigate the Risks, Vulnerabilities and Threats of Information to Ensure Data Integrity | |
| Arhore | Intrusion detection in iot systems using machine learning | |
| Shekhawat | A Multi-Objective Hyper-Heuristic Improved Configuration of Svm Based on Particle Swarm Optimization for Big Data Cyber Security | |
| Makka et al. | A Structured Investigation of Network Security Strategies and its Applications |