Title :
The Application of Computational Intelligence in Intrusion Detection Systems
Author_Institution :
Sch. of Math. Sci., South China Normal Univ., Guangzhou, China
Abstract :
The paper reviews the use of several computational intelligence(CI) methods including artificial neural networks, fuzzy systems, evolutionary computation and artificial immune systems in intrusion detection systems(IDS). These methods have their own advantages and disadvantages. It highlights the promising research directions of the use of CI in IDS which is to combine the strengths of these methods to compensate their disadvantages so we can get the better solutions.
Keywords :
artificial immune systems; evolutionary computation; fuzzy systems; neural nets; security of data; CI method; artificial immune system; artificial neural network; computational intelligence; evolutionary computation; fuzzy system; intrusion detection system; Artificial neural networks; Electronic mail; Fuzzy systems; Immune system; Intrusion detection;
Conference_Titel :
Internet Technology and Applications (iTAP), 2011 International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-7253-6
DOI :
10.1109/ITAP.2011.6006350