Cart (Loading....) | Create Account
Close category search window

Detection of intrusion using evolutionary soft computing techniques

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Arya, A. ; Dept. of Comput. Sci. & Eng., Krishna Inst. of Eng. & Technol., Ghaziabad, India ; Yadav, A. ; Kumar, S.

An intrusion detection system has the ability to detect known as well as unknown attacks. Conventionally, IDS uses association rules and simple partitioning scheme to handle quantitative data. Fuzzy partitioning scheme found to overcome the problem of vagueness of boundary and association rules are also replaced with fuzzy class association rules. Evolutionary algorithms do global search in order to discover new interesting classification rules. GNP is found better than other evolutionary algorithms due to its structure. This paper describes how evolutionary computing technologies are better to build a classifier with minimum number of class association rules and maximizing accuracy of classified patterns in intrusion detection problem.

Published in:

Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference on

Date of Conference:

6-8 Dec. 2012

Need Help?

IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.