Computational intelligence in cyber security

This keynote speech will be devoted to the application of the state-of-the-art CI (computational intelligence)-based technologies - fuzzy systems, evolutionary computation, genetic programming, neural networks and artificial immune systems, and highlight how CI-based technologies play critical roles in various computer and information security problems

[1]  Hervé Debar,et al.  An application of a recurrent network to an intrusion detection system , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.

[2]  Gary McGraw,et al.  Detecting Anomalous and Unknown Intrusions against Programs in Real-Time. , 1997 .

[3]  Fabio A. González,et al.  An Evolutionary Approach to Generate Fuzzy Anomaly Signatures , 2003, IAW.

[4]  Salvatore J. Stolfo,et al.  Using artificial anomalies to detect unknown and known network intrusions , 2003, Knowledge and Information Systems.

[5]  Alex Alves Freitas,et al.  Discovering comprehensible classification rules by using Genetic Programming: a case study in a medical domain , 1999, GECCO.

[6]  Fabio A. González,et al.  An immuno-fuzzy approach to anomaly detection , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..

[7]  Sanjay Rawat,et al.  Enhancing Computer Security with Smart Technology , 2006 .

[8]  D. Dasgupta,et al.  Mobile security agents for network traffic analysis , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[9]  Anup Ghosh,et al.  Simple, state-based approaches to program-based anomaly detection , 2002, TSEC.

[10]  Susan M. Bridges,et al.  FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .

[11]  Fabio A. González,et al.  An Intelligent Decision Support System for Intrusion Detection and Response , 2001, MMM-ACNS.

[12]  William L. Fithen,et al.  State of the Practice of Intrusion Detection Technologies , 2000 .

[13]  Kymie M. C. Tan,et al.  Detection and classification of TCP/IP network services , 1997, Proceedings 13th Annual Computer Security Applications Conference.

[14]  Arthur B. Maccabe,et al.  The architecture of a network level intrusion detection system , 1990 .

[15]  Eugene H. Spafford,et al.  Applying Genetic Programming to Intrusion Detection , 1995 .

[16]  Eugene H. Spafford,et al.  An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[17]  Marc Dacier,et al.  Intrusion detection , 1999, Comput. Networks.

[18]  Sushil Jajodia,et al.  Enhancing Profiles for Anomaly Detection Using Time Granularities , 2002, J. Comput. Secur..

[19]  Graham J. Williams,et al.  On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms , 2000, KDD '00.

[20]  Dipankar Dasgupta Immunity-Based Intrusion Detection System: A General Framework , 1999 .

[21]  Stefan Axelsson,et al.  Intrusion Detection Systems: A Survey and Taxonomy , 2002 .

[22]  K. Tan,et al.  The application of neural networks to UNIX computer security , 1995, Proceedings of ICNN'95 - International Conference on Neural Networks.

[23]  Salvatore J. Stolfo,et al.  Mining Audit Data to Build Intrusion Detection Models , 1998, KDD.

[24]  Hervé Debar,et al.  A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.