Improved Off-Line Intrusion Detection Using A Genetic Algorithm And RMI
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 1
Abstract
This article proposes an optimization of using Genetic Algorithms for the Security Audit Trail Analysis Problem, which was proposed by L. Me in 1995 and improved by Pedro A. Diaz-Gomez and Dean F. Hougen in 2005. This optimization consists in filtering the attacks. So, we classify attacks in 'Certainly not existing attacks class', 'Certainly existing attacks class' and 'Uncertainly existing attacks class'. The proposed idea is to divide the 3rd class to independent sub-problems easier to solve. We use also the remote method invocation (RMI) to reduce resolution time. The results are very significant: 0% false+, 0%false-, detection rate equal to 100%. We present also, a comparative study to confirm the given improvement.
Authors and Affiliations
Ahmed AHMIM, Nacira GHOUALMI, Noujoud KAHYA
QR Code Recognition based on Principal Components Analysis Method
QR (Quick Response) code recognition systems (based on computer vision) have always been challenging to be accurately devised due to two main constraints: (1) QR code recognition system must be able to localize QR codes...
On the Sampling and the Performance Comparison of Controlled LTI Systems
In this paper, the impact of the discretization techniques and the sampling time, on the finite-time stabilization of sampled-data controlled Linear Time Invariant (LTI) systems, is investigated. To stabilize the process...
Merge of X-ETL and XCube towards a Standard Hybrid Method for Designing Data Warehouses
There is no doubt that the hybrid approach is the best paradigm for designing effective multidimensional schemas. Its strength lies in its ability to combine the top-down and bottom-up approaches, thus exploiting the adv...
Hybrid PSO-MOBA for Profit Maximization in Cloud Computing
Cloud service provider, infrastructure vendor and clients/Cloud user’s are main actors in any cloud enterprise like Amazon web service’s cloud or Google’s cloud. Now these enterprises take care in infrastructure deployme...
A New Approach of Graph Realization for Data Hiding using Human Encoding
The rapid advancement of technology has changed the way of our living. Sharing information becomes inevitable in everyday life. However, it encounters many security issues when dealing with secret or private information....