Abstract
In daily life, people are faced with problems that have more than one solution. In computing, and other fields, researchers and developers encounter computational problems that may have a large number of solutions. In these cases, it may be almost unfeasible to determine the best one. Evolutionary computation is an appropriate technique for finding an optimal solution to a problem. Among these problems, evolutionary computation can provide an efficient way to solve those associated with computer security and forensics. This chapter examines the approaches evolutionary computation offers to discover an optimal solution to a problem. Moreover, it overviews how evolutionary computation can be applied to different scenarios related to computer security and forensics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Negnevitsky, M.: Artificial Intelligence: A guide to intelligent systems. Pearson Education Limited, Essex (2005)
Fogel, D.: Evolutionary Computation Toward a New Philosophy of Machine Intelligence, 3rd edn. IEEE Press, Piscataway (2006)
Mitchell, M.: An Introduction to Genetic Algorithms. MIT Press, Cambridge (1998)
Koza, J., Bennett, F., Andre, D., Keane, M.: Genetic programming III: Darwinian invention and problem solving. Kaufmann Publishers (1999)
Castro, J., Vinela, P.: Expert Evolutionary Computation in Computer Security and Cryptography. New Generation Computing Magazine 23(3), 193–199 (2005)
Sinclair, C., Pierce, L., Matzner, S.: An Application of Machine Learning to Network Intrusion Detection. In: Computer Phoenix, AZ, pp. 371–377. IEEE, AZ (1999)
Li, W.: Using Genetic Algorithm or Network Intrusion Detection. In: Proceedings of the United States Department of Energy Cyber Security Group 2004 Training Conference (CD ROM) CiteSeerX, p. 8. US Department of Energy CSG, Kansas city (2004)
Al- Amro, S.: Computational Intelligence towards Computer Security and Forensics. MSc thesis, Leicester,De Montfort University (2009)
Gong, R., Zulkernine, M., Abolmaesumi, P.: ‘A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection. In: Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks, pp. 246–253. IEEE, Washington, DC (2005)
Zhao, J.L., Zhao, J.F., Li, J.: Intrusion Detection based on Clustering Genetic Algorithms. Machine Learning and Cybernetics 6, 3911–3914 (2005)
LaRoche, P., Zincir-Heywood, A.: 802.11Network Intrusion Detection using Genetic Programming. In: Proceedings of the 2005 Workshops on Genetic and Evolutionary Computation, pp. 170–171. ACM, New York (2005)
Crosbie, M., Spafford, G.: Applying Genetic Programming to Intrusion Detection. In: Proceedings of the AAAI 1995 Fall Symposium Series on Genetic Programming, pp. 1–8. AAAI, Menlo Park (1995)
Brameier, M., Banzhaf, W.: Linear Genetic Programming. Springer Science + Business Media, LLC, New York (2006)
Mukkamala, S., Sung, A., Abraham, A.: ‘A Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach’. In: Proceedings of the 17th International Conference on Innovations in Applied Artificial Intelligence, pp. 633–642. Springer, Heidelberg (2004)
Merkle, L.: Automated Network Forensics. In: Proceedings of the 2008 GECCO Conference Companion on Genetic and Evolutionary Computation, pp. 1929–1932. ACM, New York (2008)
Huang, J., Liu, C., Wechsler, H.: Eye Detection and Face Recognition Using Evolutionary Computation. In: Proceedings of NATO-ASI on Face Recognition: From Theory to Applications, pp. 348–377. Springer, Heidelberg (1998)
Upadhyaya, D., Ngo, H., Pramanik, S., Chinchani, R., Mathew, S.: Insider Threat Analysis Using Information-Centric Modeling. In: Craiger, P., Shenoi, S. (eds.) Advances in Digital Forensics, 3rd edn., pp. 53–73. Springer, New York (2007)
Bradford, P., Hu, N.: A layered approach to insider threat detection and proactive forensics. In: Technology Blitz of the Twenty-First Annual Computer Security Applications Conference, Tucson, AZ. ACSAC, Silver Spring (2005)
Bankovic, Z., Stepanovic, D., Bojanic, S., Nieto-Taladriz, O.: Improving network security using genetic algorithm approach. Journal of Computers and Electrical Engineering 33(1), 438–451 (2007)
Lange, R., Mancoridis, S.: Using Code Metric Histograms and Genetic Algorithms to Perform Author Identification for Software Forensics. In: Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, pp. 2082–2089. ACM, New York (2007)
Gray, A., Sallis, P., MacDonell, S.: A Dictionary-based System for Extracting Source Code Metrics for Software Forensics. In: Proceedings of Software Engineering: Education & Practice, pp. 252–259. IEEE Computer Society, California (1998)
Calhoun, W., Coles, D.: Predicting the types of file fragments. The Journal of Digital Investigation 5(1), 14–20 (2007)
Ballerini, L., Cordon, O., Santamaria, J., Damas, S., Aleman, I., Botella, M.: Craniofacial Superimposition in Forensic Identification using Genetic Algorithms. In: The Third International Symposium on Information Assurance and Security, pp. 429–434. IEEE Computer Society, California (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Amro, S.A., Elizondo, D.A., Solanas, A., MartÃnez-Ballesté, A. (2012). Evolutionary Computation in Computer Security and Forensics: An Overview. In: Elizondo, D., Solanas, A., Martinez-Balleste, A. (eds) Computational Intelligence for Privacy and Security. Studies in Computational Intelligence, vol 394. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25237-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-25237-2_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25236-5
Online ISBN: 978-3-642-25237-2
eBook Packages: EngineeringEngineering (R0)