Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2013, Article ID 962185, 14 pages
http://dx.doi.org/10.1155/2013/962185
Research Article

Design of an Evolutionary Approach for Intrusion Detection

Shaheed Bhagat Singh State Technical Campus, Ferozepur, Punjab 152004, India

Received 21 August 2013; Accepted 16 September 2013

Academic Editors: Y. Xiang and Y. Xie

Copyright © 2013 Gulshan Kumar and Krishan Kumar. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [17 citations]

The following is the list of published articles that have cited the current article.

  • Karen Medhat, Rabie A. Ramadan, and Ihab Talkhan, “Distributed Intrusion Detection System for Wireless Sensor Networks,” 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, pp. 234–239, . View at Publisher · View at Google Scholar
  • Michael Milliken, Yaxin Bi, Leo Galway, and Glenn Hawe, “Multi-objective optimization of base classifiers in StackingC by NSGA-II for intrusion detection,” 2016 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1–8, . View at Publisher · View at Google Scholar
  • Randall Wald, Taghi M. Khoshgoftaar, Richard Zuech, Amri Napolitano, Randall Wald, Taghi M. Khoshgoftaar, Richard Zuech, and Amri Napolitano, “Network traffic prediction models for near- and long-term predictions,” Proceedings - IEEE 14th International Conference on Bioinformatics and Bioengineering, BIBE 2014, pp. 362–368, 2014. View at Publisher · View at Google Scholar
  • Hongping Wang, Xi Lu, Xiaoge Zhang, Qing Wang, and Yong Deng, “A Bio-Inspired Method for the Constrained Shortest Path Problem,” The Scientific World Journal, vol. 2014, pp. 1–11, 2014. View at Publisher · View at Google Scholar
  • Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, and Jiankun Hu, “Detection of Denial-of-Service Attacks Based on Computer Vision Techniques,” Ieee Transactions On Computers, vol. 64, no. 9, pp. 2519–2533, 2015. View at Publisher · View at Google Scholar
  • Felix Morales-flores, Karen Susana Olivares-Palomares, María Isabel Aguilar-Laurents, Jose Fausto Rivero-Cruz, Blas Lotina-Hennsen, and Beatriz King-Díaz, “Flavonoids Affect the Light Reaction of Photosynthesis in vitro and in vivo, as well as, the Growth of Plants.,” Journal of Agricultural and Food Chemistry, pp. 150831101725007, 2015. View at Publisher · View at Google Scholar
  • M. Pokhrel, G. A. Kumar, C. -G. Ma, M. G. Brik, Brian W. Langloss, Ian N. Stanton, Michael J. Therien, D. K. Sardar, and Yuanbing Mao, “Electronic and optical properties of Er-doped Y2O2S phosphors,” Journal Of Materials Chemistry C, vol. 3, no. 43, pp. 11486–11496, 2015. View at Publisher · View at Google Scholar
  • Ashkan Sami, Naser Fallahi, and Morteza Tajbakhsh, “Automated flow-based rule generation for network intrusion detection systems,” 2016 24th Iranian Conference on Electrical Engineering, ICEE 2016, pp. 1948–1953, 2016. View at Publisher · View at Google Scholar
  • Benjamin L. Williams, Mikhail V. Ponomarev, Marcel A. Verheijen, Harm C. M. Knoops, Abhinaya Chandramohan, Leo Duval, Mauritius C. M. van de Sanden, and Mariadriana Creatore, “Expanding Thermal Plasma Deposition of Al-Doped ZnO: On the Effect of the Plasma Chemistry on Film Growth Mechanisms,” Plasma Processes And Polymers, vol. 13, no. 1, pp. 54–69, 2016. View at Publisher · View at Google Scholar
  • Montserrat-De La Paz, Naranjo, Bermúdez, López, Abia, and Muriana, “Dietary fatty acids and lipoproteins on progression of age-related macular degeneration,” Grasas y Aceites, vol. 68, no. 2, 2017. View at Publisher · View at Google Scholar
  • Abdulla Amin Aburomman, and Mamun Bin Ibne Reaz, “A survey of intrusion detection systems based on ensemble and hybrid classifiers,” Computers & Security, vol. 65, pp. 135–152, 2017. View at Publisher · View at Google Scholar
  • Tarfa Hamed, Rozita Dara, and Stefan C. Kremer, “Network intrusion detection system based on recursive feature addition and bigram technique,” Computers & Security, 2017. View at Publisher · View at Google Scholar
  • Karen Medhat, Rabie A. Ramadan, and Ihab Talkhan, “Security in Mission Critical Communication Systems,” Multimedia Services and Applications in Mission Critical Communication Systems, pp. 270–291, 2017. View at Publisher · View at Google Scholar
  • Chodidjah, Eni Widayati, and Taufiqurrachman Nasihun, “Treatment of thyponium flageliforme in combination with Curcuma Zedoaria, and phyllanthus niruri synergistically enhances apoptotic and anti-proliferative effect on breast cancer,” Journal of Natural Remedies, vol. 17, no. 1, pp. 1–8, 2017. View at Publisher · View at Google Scholar
  • Jakub Hrabovsky, Pavel Segec, Marek Moravcik, and Jozef Papan, “Trends in Application of Machine Learning to Network-Based Intrusion Detection Systems,” Innovations for Community Services, vol. 863, pp. 218–228, 2018. View at Publisher · View at Google Scholar
  • Buse Gul Atli, Yoan Miche, Aapo Kalliola, Ian Oliver, Silke Holtmanns, and Amaury Lendasse, “Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space,” Cognitive Computation, 2018. View at Publisher · View at Google Scholar
  • Vajiheh Hajisalem, and Shahram Babaie, “A Hybrid Intrusion Detection System Based on ABC-AFS Algorithm for Misuse and Anomaly Detection,” Computer Networks, 2018. View at Publisher · View at Google Scholar