2012
DOI: 10.1007/978-3-642-30976-2_47
|View full text |Cite
|
Sign up to set email alerts
|

The Application of Genetic Algorithm to Intrusion Detection in MP2P Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 2 publications
0
7
0
Order By: Relevance
“…A probabilistic classifier detects anomalies and a hidden Markov model narrows down attacker addresses [13]. Recently, genetic algorithms have been widely used in anomaly detection and misuse detection [14], [15]. Another recent development is using artificial immune systems (AIS) in intrusion detection [16].…”
Section: Related Researchmentioning
confidence: 99%
“…A probabilistic classifier detects anomalies and a hidden Markov model narrows down attacker addresses [13]. Recently, genetic algorithms have been widely used in anomaly detection and misuse detection [14], [15]. Another recent development is using artificial immune systems (AIS) in intrusion detection [16].…”
Section: Related Researchmentioning
confidence: 99%
“…A probabilistic classifier detects anomalies and a hidden Markov model narrows down attacker addresses [8]. Recently genetic algorithms have been widely used in anomaly detection and misuse detection [9], [10]. Artificial immune systems have raised the interest of intrusion detection researchers [11].…”
Section: Anomaly-based Intrusion Detection Systemmentioning
confidence: 99%
“…For example, in literature [1], a hybrid intrusion detection model combining misuse detection and anomaly detection is proposed. In [2][3][4][5][6][7], other learning algorithms are applied to intrusion detection, such as support vector machine, genetic algorithm, and artificial neural network.…”
Section: Introductionmentioning
confidence: 99%