MISUSE DETECTION - An Iterative Process vs. A Genetic Algorithm Approach
Pedro A. Diaz-Gomez, Dean F. Hougen
2007
Abstract
With the explosion of the Internet and its use, the development of security mechanims are quite important in order to preserve the confidentiality, integrity, and availability of data stored in computers. However, the growth of intrusions can make such mechanisms almost unusable, in the sense that the computation time or space needed in order to mantain them can grow exponentially. This position paper presents an iterative process for doing misuse detection, and compares it with another approach for doing that: a Genetic Algorithm.
DownloadPaper Citation
in Harvard Style
A. Diaz-Gomez P. and F. Hougen D. (2007). MISUSE DETECTION - An Iterative Process vs. A Genetic Algorithm Approach . In Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 978-972-8865-89-4, pages 455-458. DOI: 10.5220/0002410804550458
in Bibtex Style
@conference{iceis07,
author={Pedro A. Diaz-Gomez and Dean F. Hougen},
title={MISUSE DETECTION - An Iterative Process vs. A Genetic Algorithm Approach},
booktitle={Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 2: ICEIS,},
year={2007},
pages={455-458},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002410804550458},
isbn={978-972-8865-89-4},
}
in EndNote Style
TY - CONF
JO - Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 2: ICEIS,
TI - MISUSE DETECTION - An Iterative Process vs. A Genetic Algorithm Approach
SN - 978-972-8865-89-4
AU - A. Diaz-Gomez P.
AU - F. Hougen D.
PY - 2007
SP - 455
EP - 458
DO - 10.5220/0002410804550458