{"title":"一种用于检测新型计算机网络攻击的进化编程方法","authors":"Kevin P. Anchor, G. Lamont, G. Gunsch","doi":"10.1109/CEC.2002.1004484","DOIUrl":null,"url":null,"abstract":"Attacks against computer networks are becoming more sophisticated, with adversaries using new attacks or modifying exiting attacks. This research presents an initial step in using an evolutionary programming approach to develop a system for automatically detecting attacks with features similar to known attacks. Initial testing shows the algorithm performs satisfactorily.","PeriodicalId":184547,"journal":{"name":"Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"An evolutionary programming approach for detecting novel computer network attacks\",\"authors\":\"Kevin P. Anchor, G. Lamont, G. Gunsch\",\"doi\":\"10.1109/CEC.2002.1004484\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Attacks against computer networks are becoming more sophisticated, with adversaries using new attacks or modifying exiting attacks. This research presents an initial step in using an evolutionary programming approach to develop a system for automatically detecting attacks with features similar to known attacks. Initial testing shows the algorithm performs satisfactorily.\",\"PeriodicalId\":184547,\"journal\":{\"name\":\"Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2002-05-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CEC.2002.1004484\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CEC.2002.1004484","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An evolutionary programming approach for detecting novel computer network attacks
Attacks against computer networks are becoming more sophisticated, with adversaries using new attacks or modifying exiting attacks. This research presents an initial step in using an evolutionary programming approach to develop a system for automatically detecting attacks with features similar to known attacks. Initial testing shows the algorithm performs satisfactorily.