Security

An Evolution Strategy Approach Toward Rule-Set Generation for Network Intrusion Detection Systems (IDS)

Free registration required

Executive Summary

With the increasing number of intrusions in systems' and networks' infrastructures, Intrusion Detection Systems (IDS) have become an active area of research to develop reliable and effective solutions to detect and counter them. The use of Evolutionary Algorithms in IDS has proved its maturity over the times. Although most of the research works have been based on the use of genetic algorithms in IDS, this paper presents an approach toward the generation of rules for the identification of anomalous connections using evolution Strategies.

  • Format: PDF
  • Size: 332.45 KB