802.11 Network Intrusion Detection using Genetic
Programming
P. LaRoche, and A. Zincir-Heywood. Genetic and Evolutionary Computation Conference
(GECCO2005) workshop program, page 170--171. Washington, D.C., USA, ACM Press, (25-29 June 2005)
Abstract
Genetic Programming (GP) based Intrusion Detection
Systems (IDS) use connection state network data during
their training phase. These connection states are
recorded as a set of features that the GP uses to train
and test solutions which allow for the efficient and
accurate detection of given attack patterns. However,
when applied to a 802.11 network that is faced with
attacks specific to the 802.11 protocol, the GP's
detection rate reduces dramatically. We discuss what
causes this effect, and what can be done to improve
GP's performance on 802.11 networks.
%0 Conference Paper
%1 laroche:gecco05ws
%A LaRoche, Patrick
%A Zincir-Heywood, A. Nur
%B Genetic and Evolutionary Computation Conference
(GECCO2005) workshop program
%C Washington, D.C., USA
%D 2005
%E Rothlauf, Franz
%E Blowers, Misty
%E Branke, Jürgen
%E Cagnoni, Stefano
%E Garibay, Ivan I.
%E Garibay, Ozlem
%E Grahl, Jörn
%E Hornby, Gregory
%E de Jong, Edwin D.
%E Kovacs, Tim
%E Kumar, Sanjeev
%E Lima, Claudio F.
%E Llorà, Xavier
%E Lobo, Fernando
%E Merkle, Laurence D.
%E Miller, Julian
%E Moore, Jason H.
%E O'Neill, Michael
%E Pelikan, Martin
%E Riopka, Terry P.
%E Ritchie, Marylyn D.
%E Sastry, Kumara
%E Smith, Stephen L.
%E Stringer, Hal
%E Takadama, Keiki
%E Toussaint, Marc
%E Upton, Stephen C.
%E Wright, Alden H.
%I ACM Press
%K algorithms, genetic programming
%P 170--171
%T 802.11 Network Intrusion Detection using Genetic
Programming
%U http://www.cs.bham.ac.uk/~wbl/biblio/gecco2005wks/papers/0170.pdf
%X Genetic Programming (GP) based Intrusion Detection
Systems (IDS) use connection state network data during
their training phase. These connection states are
recorded as a set of features that the GP uses to train
and test solutions which allow for the efficient and
accurate detection of given attack patterns. However,
when applied to a 802.11 network that is faced with
attacks specific to the 802.11 protocol, the GP's
detection rate reduces dramatically. We discuss what
causes this effect, and what can be done to improve
GP's performance on 802.11 networks.
@inproceedings{laroche:gecco05ws,
abstract = {Genetic Programming (GP) based Intrusion Detection
Systems (IDS) use connection state network data during
their training phase. These connection states are
recorded as a set of features that the GP uses to train
and test solutions which allow for the efficient and
accurate detection of given attack patterns. However,
when applied to a 802.11 network that is faced with
attacks specific to the 802.11 protocol, the GP's
detection rate reduces dramatically. We discuss what
causes this effect, and what can be done to improve
GP's performance on 802.11 networks.},
added-at = {2008-06-19T17:35:00.000+0200},
address = {Washington, D.C., USA},
author = {LaRoche, Patrick and Zincir-Heywood, A. Nur},
biburl = {https://www.bibsonomy.org/bibtex/2f57f0bffc7fe8a9c6e3f40ec43c97bd5/brazovayeye},
booktitle = {Genetic and Evolutionary Computation Conference
{(GECCO2005)} workshop program},
editor = {Rothlauf, Franz and Blowers, Misty and Branke, J{\"u}rgen and Cagnoni, Stefano and Garibay, Ivan I. and Garibay, Ozlem and Grahl, J{\"o}rn and Hornby, Gregory and {de Jong}, Edwin D. and Kovacs, Tim and Kumar, Sanjeev and Lima, Claudio F. and Llor{\`a}, Xavier and Lobo, Fernando and Merkle, Laurence D. and Miller, Julian and Moore, Jason H. and O'Neill, Michael and Pelikan, Martin and Riopka, Terry P. and Ritchie, Marylyn D. and Sastry, Kumara and Smith, Stephen L. and Stringer, Hal and Takadama, Keiki and Toussaint, Marc and Upton, Stephen C. and Wright, Alden H.},
interhash = {48d4d106a9346e1268059baa2c56af22},
intrahash = {f57f0bffc7fe8a9c6e3f40ec43c97bd5},
keywords = {algorithms, genetic programming},
month = {25-29 June},
notes = {Distributed on CD-ROM at GECCO-2005. ACM
1-59593-097-3/05/0006},
pages = {170--171},
publisher = {ACM Press},
timestamp = {2008-06-19T17:45:10.000+0200},
title = {802.11 Network Intrusion Detection using Genetic
Programming},
url = {http://www.cs.bham.ac.uk/~wbl/biblio/gecco2005wks/papers/0170.pdf},
year = 2005
}