Abstract
The present article exposes a prototype and a security system, which using Artificial Intelligence of Neural Networks, using different environments to train and learn attacks, seeking to optimize the overall average of threats, minimizing the percent of vulnerabilities using an evolutionary algorithm called EVONORM.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Under Cyber Attack EYās Global Information Security Survey (2013)
Tuckanik: Packet filtering by Artificial Neural Network (2015)
Salek, Z., Madani, F.M., Azmi, R.: Intrusion detection using neural networks trained by differential evaluation algorithm (2015)
Ishitaki, T., Liu, Y., et al.: Application of neural networks for intrusion detection in tor networks (2015)
Hosnieh, R., Christop, M., et al.: A flexible framework for detecting IPv6 vulnerabilidades (2013)
Esmaily, J., Ghasemi, J.: Intrusion detection system on multi-layer perceptron neural networks and decision tree (2015)
Sagar, V., Kumar, K.: A symmetric key cryptography using genetic algorithm and error back propagation neural net (2015)
Cisco 2014 Annual Security Report
Symantec Security Glossary, Kaspersky Security Bulletin (2015)
Ganesh Kumar, P., Devaraj, D.: Intrusion detection using artificial neural network with reduced input features. Revista ICTACT J. Soft Comput. 01(01), 30ā31 (2010)
Esmaily, J., Moradinezhad, R.: Intrusion detection system based on multi-layer perceptron neural networks and decision tree. In: IKT 2015
Zabra, Fariborz, Reza: Intrusion detection using neural nerworks trained by differencial evaluation algorithm
Travallaee, M., Bagheri, E., Lu, W., Ghorbani, A.: A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Applications (CISDA 2009) (2009)
Lorenzo Fonseca, I., MaciĆ” PĆ©rez, F., Lau FernĆ”ndez, R., et al.: MĆ©todo para la detecciĆ³n de intrusos mediante redes neuronales basado en la reducciĆ³n de caracterĆsticas. Centro de Estudios de IngenierĆa y Sistemas Instituto Superior PolitĆ©cnico JosĆ© Antonio EchevarrĆa (2008)
De la Hoz Franco, E., De la Hoz Correa, E.M., Ortiz, A., Ortega, J.: Modelo de detecciĆ³n de intrusiones en sistemas de red, realizando selecciĆ³n de caracterĆsticas con FDR y entrenamiento y clasificaciĆ³n con SOM, vol. 8(1), pp. 85ā116, Octubre de 2012
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Sergio OrdoƱez, G., Cesar Guerra, T. (2018). Prototype of a Security System with Artificial Intelligence Using Neural Networks and Evolutionary Algorithms. In: Torres Guerrero, F., Lozoya-Santos, J., Gonzalez Mendivil, E., Neira-Tovar, L., RamĆrez Flores, P., Martin-Gutierrez, J. (eds) Smart Technology. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 213. Springer, Cham. https://doi.org/10.1007/978-3-319-73323-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-73323-4_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-73322-7
Online ISBN: 978-3-319-73323-4
eBook Packages: Computer ScienceComputer Science (R0)