Presenting a method for intrusion detection in computer networks using Metaheuristic Algorithm
عنوان مقاله: Presenting a method for intrusion detection in computer networks using Metaheuristic Algorithm
شناسه ملی مقاله: ARGCONF03_004
منتشر شده در سومین کنفرانس سالانه ملی مهندسی برق، کامپیوتر و بیو الکتریک ایران در سال 1397
شناسه ملی مقاله: ARGCONF03_004
منتشر شده در سومین کنفرانس سالانه ملی مهندسی برق، کامپیوتر و بیو الکتریک ایران در سال 1397
مشخصات نویسندگان مقاله:
LEILA FATHI - DEPARTMENT OF COMPUTER ENGINEERING KERMAN BRANCH ISLAMIC AZAD UNIVWERSITY IRAN
ALI GHAFURI - Department of computer engineering, Sobhan Higher Education Institution, Neyshabur, Iran
YASER ZAHIRI - Department of computer engineering, Sobhan Higher Education Institution, Neyshabur, Iran
MOHAMAD MEHDI ABOALFAZLI - Department of computer engineering, Sobhan Higher Education Institution, Neyshabur, Iran
خلاصه مقاله:
LEILA FATHI - DEPARTMENT OF COMPUTER ENGINEERING KERMAN BRANCH ISLAMIC AZAD UNIVWERSITY IRAN
ALI GHAFURI - Department of computer engineering, Sobhan Higher Education Institution, Neyshabur, Iran
YASER ZAHIRI - Department of computer engineering, Sobhan Higher Education Institution, Neyshabur, Iran
MOHAMAD MEHDI ABOALFAZLI - Department of computer engineering, Sobhan Higher Education Institution, Neyshabur, Iran
To provide full security in a computer system, in addition to firewalls and other blocking filters, other system is needed, known as intrusion detection system (IDS) which can identify and fight hackers. intrusion detection system is categorized on 3 aspects: detection method, Architecture and the way they react to intrusion.Identifying methods include: Identifying abnormal behavior and misuse detection (signature-base diagnosis). Smart-algorithms like particle optimize algorithm is used to identify normal packet form abnormal one. In this paper, we used and tested a particle optimization Algorithm on raw data set and active a %91 precision.
کلمات کلیدی: IDS – Metaheuristic – Particle swarm optimization
صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/754140/