2005 International Conference on Machine Learning and Cybernetics 2005
DOI: 10.1109/icmlc.2005.1527615
|View full text |Cite
|
Sign up to set email alerts
|

Ant colony optimization based network intrusion feature selection and detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…In this mainly used no: of Nodes (N) and Ares which are undirected(A).For creating path to build minimization or maximization problems these two points plays important role like source and destination nodes. In this optimization method the above two points will act as for the nest and food source [14].To build the solution ants will generate the loops as well as by updating of pheromone it will be attractive. These ants will behave like real ants for solving the problems either maximization or minimization.…”
Section: Ant Colony Optimizationmentioning
confidence: 99%
“…In this mainly used no: of Nodes (N) and Ares which are undirected(A).For creating path to build minimization or maximization problems these two points plays important role like source and destination nodes. In this optimization method the above two points will act as for the nest and food source [14].To build the solution ants will generate the loops as well as by updating of pheromone it will be attractive. These ants will behave like real ants for solving the problems either maximization or minimization.…”
Section: Ant Colony Optimizationmentioning
confidence: 99%
“…A packet is the basic unit of data transmitted over a network, containing a header with the source and destination addresses, and a payload with the actual data. As the packet moves through the TCP/IP protocol stack, each layer adds or removes fields from the header, and when a protocol on the sender's end adds information to the header, it's called data encapsulation [6]. Additionally, the modified packet is given a distinct name at each layer, as depicted in the figure below.…”
Section: Data Encapsulation and The Tcp/ip Protocol Stackmentioning
confidence: 99%
“…Further, it is used in feature selection for IDS with interesting approach, but it is still limited. In this section, we present three improving works which are [67][68][69]. Table 13 and Table 14 illustrate the different proposed approach of ant colony for feature selection and their results.…”
Section: Ant Colony Optimizationmentioning
confidence: 99%