Ant Colony Optimization Algorithm in Intrusion Detection and Positive

Article Preview

Abstract:

Ant colony algorithm is an effective algorithm to solve combinatorial optimization problems, it has many good features, and there are also some disadvantages. In this paper, through research on ant colony optimization algorithm, apply it in intrusion detection. Then it gives an improved ant colony optimization algorithm. Tests show that the algorithm improves the efficiency of intrusion detection, reduces false positives of intrusion detection.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

541-545

Citation:

Online since:

October 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Lu H. Y, Liang. H. Wang H. C, Wang H. J, WANG X. B. (2010) Dodos attack source tracing technology research Based on IPv6. IEEE International Conference on Internet Technology and Applications (ITAP 2010), 2010, Wuhan, China 1(4): 112-114.

DOI: 10.1109/itapp.2010.5566634

Google Scholar

[2] CooPer, M., Feamow , M., Frederiek, K. a, ldNorthcut, S (2001) Intrusion Signatures andAnaysis. 1st Edition-New Riders Publishing, January 2(6): 337-339.

Google Scholar

[3] Stutzle T. Hoos HH. MAX-MIN ant xystem and localsearch (1997) for the traveling salesman In IEEEInt'1 Confront Evolutionary Computation. Indianapolis: IEEE Press309-314.

DOI: 10.1109/icec.1997.592327

Google Scholar

[4] Bilchev G. Parmee IC (1995) Adaptive searching strategic for heavily constrained design spaces Proceedings of 22nd International Conference on Computer Aided Design Yalta: U k rainc 4(4): 861-864.

Google Scholar

[5] ColoA., norigoM Maniezzov (1991) Instituted optimization by anthologies. Proceedings of the First European Conference on Artificial Life 5(3): 255-259.

Google Scholar

[6] Dorigo M Maniezzov Colombia (1996) Nosy stem: optimization by apology of cooperating agents. IEEET transactions on Systems, Man, and Cy beetles Parts 6(l): 29-41.

Google Scholar

[7] Marco Dorigo and Thomas StUtzle(2004) A, ItColo, lyOPtimization MIT Press 541-546.

Google Scholar

[8] Zhang. B. Li W. H (2006) Study on Phishing Attack Behavior land Defense Model, The 2006 IEEE/WIC/ACM International Con forenoon Web intelligence, Hong Kong 8(5): 631-640.

Google Scholar