Skip to main content

Evolutionary Computation in Computer Security and Forensics: An Overview

  • Chapter
  • First Online:
Computational Intelligence for Privacy and Security

Part of the book series: Studies in Computational Intelligence ((SCI,volume 394))

Abstract

In daily life, people are faced with problems that have more than one solution. In computing, and other fields, researchers and developers encounter computational problems that may have a large number of solutions. In these cases, it may be almost unfeasible to determine the best one. Evolutionary computation is an appropriate technique for finding an optimal solution to a problem. Among these problems, evolutionary computation can provide an efficient way to solve those associated with computer security and forensics. This chapter examines the approaches evolutionary computation offers to discover an optimal solution to a problem. Moreover, it overviews how evolutionary computation can be applied to different scenarios related to computer security and forensics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Negnevitsky, M.: Artificial Intelligence: A guide to intelligent systems. Pearson Education Limited, Essex (2005)

    Google Scholar 

  2. Fogel, D.: Evolutionary Computation Toward a New Philosophy of Machine Intelligence, 3rd edn. IEEE Press, Piscataway (2006)

    Google Scholar 

  3. Mitchell, M.: An Introduction to Genetic Algorithms. MIT Press, Cambridge (1998)

    MATH  Google Scholar 

  4. Koza, J., Bennett, F., Andre, D., Keane, M.: Genetic programming III: Darwinian invention and problem solving. Kaufmann Publishers (1999)

    Google Scholar 

  5. Castro, J., Vinela, P.: Expert Evolutionary Computation in Computer Security and Cryptography. New Generation Computing Magazine 23(3), 193–199 (2005)

    Article  Google Scholar 

  6. Sinclair, C., Pierce, L., Matzner, S.: An Application of Machine Learning to Network Intrusion Detection. In: Computer Phoenix, AZ, pp. 371–377. IEEE, AZ (1999)

    Google Scholar 

  7. Li, W.: Using Genetic Algorithm or Network Intrusion Detection. In: Proceedings of the United States Department of Energy Cyber Security Group 2004 Training Conference (CD ROM) CiteSeerX, p. 8. US Department of Energy CSG, Kansas city (2004)

    Google Scholar 

  8. Al- Amro, S.: Computational Intelligence towards Computer Security and Forensics. MSc thesis, Leicester,De Montfort University (2009)

    Google Scholar 

  9. Gong, R., Zulkernine, M., Abolmaesumi, P.: ‘A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection. In: Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks, pp. 246–253. IEEE, Washington, DC (2005)

    Google Scholar 

  10. Zhao, J.L., Zhao, J.F., Li, J.: Intrusion Detection based on Clustering Genetic Algorithms. Machine Learning and Cybernetics 6, 3911–3914 (2005)

    Article  Google Scholar 

  11. LaRoche, P., Zincir-Heywood, A.: 802.11Network Intrusion Detection using Genetic Programming. In: Proceedings of the 2005 Workshops on Genetic and Evolutionary Computation, pp. 170–171. ACM, New York (2005)

    Chapter  Google Scholar 

  12. Crosbie, M., Spafford, G.: Applying Genetic Programming to Intrusion Detection. In: Proceedings of the AAAI 1995 Fall Symposium Series on Genetic Programming, pp. 1–8. AAAI, Menlo Park (1995)

    Google Scholar 

  13. Brameier, M., Banzhaf, W.: Linear Genetic Programming. Springer Science + Business Media, LLC, New York (2006)

    Google Scholar 

  14. Mukkamala, S., Sung, A., Abraham, A.: ‘A Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach’. In: Proceedings of the 17th International Conference on Innovations in Applied Artificial Intelligence, pp. 633–642. Springer, Heidelberg (2004)

    Google Scholar 

  15. Merkle, L.: Automated Network Forensics. In: Proceedings of the 2008 GECCO Conference Companion on Genetic and Evolutionary Computation, pp. 1929–1932. ACM, New York (2008)

    Chapter  Google Scholar 

  16. Huang, J., Liu, C., Wechsler, H.: Eye Detection and Face Recognition Using Evolutionary Computation. In: Proceedings of NATO-ASI on Face Recognition: From Theory to Applications, pp. 348–377. Springer, Heidelberg (1998)

    Google Scholar 

  17. Upadhyaya, D., Ngo, H., Pramanik, S., Chinchani, R., Mathew, S.: Insider Threat Analysis Using Information-Centric Modeling. In: Craiger, P., Shenoi, S. (eds.) Advances in Digital Forensics, 3rd edn., pp. 53–73. Springer, New York (2007)

    Google Scholar 

  18. Bradford, P., Hu, N.: A layered approach to insider threat detection and proactive forensics. In: Technology Blitz of the Twenty-First Annual Computer Security Applications Conference, Tucson, AZ. ACSAC, Silver Spring (2005)

    Google Scholar 

  19. Bankovic, Z., Stepanovic, D., Bojanic, S., Nieto-Taladriz, O.: Improving network security using genetic algorithm approach. Journal of Computers and Electrical Engineering 33(1), 438–451 (2007)

    Article  Google Scholar 

  20. Lange, R., Mancoridis, S.: Using Code Metric Histograms and Genetic Algorithms to Perform Author Identification for Software Forensics. In: Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, pp. 2082–2089. ACM, New York (2007)

    Chapter  Google Scholar 

  21. Gray, A., Sallis, P., MacDonell, S.: A Dictionary-based System for Extracting Source Code Metrics for Software Forensics. In: Proceedings of Software Engineering: Education & Practice, pp. 252–259. IEEE Computer Society, California (1998)

    Google Scholar 

  22. Calhoun, W., Coles, D.: Predicting the types of file fragments. The Journal of Digital Investigation 5(1), 14–20 (2007)

    Google Scholar 

  23. Ballerini, L., Cordon, O., Santamaria, J., Damas, S., Aleman, I., Botella, M.: Craniofacial Superimposition in Forensic Identification using Genetic Algorithms. In: The Third International Symposium on Information Assurance and Security, pp. 429–434. IEEE Computer Society, California (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sulaiman Al Amro .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Amro, S.A., Elizondo, D.A., Solanas, A., Martínez-Ballesté, A. (2012). Evolutionary Computation in Computer Security and Forensics: An Overview. In: Elizondo, D., Solanas, A., Martinez-Balleste, A. (eds) Computational Intelligence for Privacy and Security. Studies in Computational Intelligence, vol 394. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25237-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25237-2_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25236-5

  • Online ISBN: 978-3-642-25237-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics