OPTIMIZATION ALGORITHMS FOR INTRUSION DETECTION SYSTEM: A REVIEW
Journal: INTERNATIONAL JOURNAL OF RESEARCH -GRANTHAALAYAH (Vol.8, No. 8)Publication Date: 2020-08-31
Authors : Sheren Sadiq Hasan; Adel Sabry Eesa;
Page : 217-225
Keywords : Intrusion Detection; Anomaly Detection; Misuse Detection; Optimization Algorithms;
Abstract
With the growth and development of the Internet, the devices and the hosts connected to the Internet have become the target for attackers and intruders. Consequently, the integrity of systems and data has become more sophisticated. Meanwhile, many institutions suffer from moneylosing or other losses due to attacks on computer systems. Accordingly, the detection of intrusion and attacks has become a challenge and a vital necessity at the same time. Many different methods were used to build intrusion detection systems (IDSs), and all these methods seek to a plus the efficiency of intrusion detection systems. This paper is a survey which tries to covers some of the optimization algorithms used in the field of intrusion detection in past ten years such as Artificial Bee Colony (ABC), Genetic Algorithm (GA), Cuttlefish Algorithms (CFA), and Particle Swarm Optimization (PSO). It is hoped that this review will provide useful insights about the intrusion detection literature and is a good source for anyone interested in applying one of the used optimization algorithms in the field of intrusion detection.
Other Latest Articles
- AN ANALYSIS OF IMPACT OF EVIDENCE BASED LEARNING ON ACADEMIC ACHIEVEMENT OF STUDENTS
- DOSAGE EFFECTIVENESS OF MANURE AND PLANTING DISTANCE ON THE GROWTH AND PRODUCTION OF PEANUTS (ARACHIS HYPOGAEA, L)
- FEAR OF CONTRACTING COVID-19: INFLUENCE OF INFORMATION SOURCES AND MESSAGE CONTENT ON FEAR- AROUSAL AMONG BODA BODA RIDERS IN NAIROBI COUNTY, KENYA
- PASTORALISTS’ PERCEPTIONS ON AN INVASIVE ALIEN PLANT PARTHENIUM HYSTEROPHORUS AND ITS MANAGEMENT CONTROL IN SIMANJIRO DISTRICT, TANZANIA
- 射频消融治疗晚期肺癌的临床观察与护理干预研究
Last modified: 2020-09-15 18:37:31