Skip to main content

Prototype of a Security System with Artificial Intelligence Using Neural Networks and Evolutionary Algorithms

  • Conference paper
  • First Online:
Smart Technology

Abstract

The present article exposes a prototype and a security system, which using Artificial Intelligence of Neural Networks, using different environments to train and learn attacks, seeking to optimize the overall average of threats, minimizing the percent of vulnerabilities using an evolutionary algorithm called EVONORM.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Under Cyber Attack EYā€™s Global Information Security Survey (2013)

    Google ScholarĀ 

  2. Tuckanik: Packet filtering by Artificial Neural Network (2015)

    Google ScholarĀ 

  3. Salek, Z., Madani, F.M., Azmi, R.: Intrusion detection using neural networks trained by differential evaluation algorithm (2015)

    Google ScholarĀ 

  4. Ishitaki, T., Liu, Y., et al.: Application of neural networks for intrusion detection in tor networks (2015)

    Google ScholarĀ 

  5. Hosnieh, R., Christop, M., et al.: A flexible framework for detecting IPv6 vulnerabilidades (2013)

    Google ScholarĀ 

  6. Esmaily, J., Ghasemi, J.: Intrusion detection system on multi-layer perceptron neural networks and decision tree (2015)

    Google ScholarĀ 

  7. Sagar, V., Kumar, K.: A symmetric key cryptography using genetic algorithm and error back propagation neural net (2015)

    Google ScholarĀ 

  8. Cisco 2014 Annual Security Report

    Google ScholarĀ 

  9. Symantec Security Glossary, Kaspersky Security Bulletin (2015)

    Google ScholarĀ 

  10. Ganesh Kumar, P., Devaraj, D.: Intrusion detection using artificial neural network with reduced input features. Revista ICTACT J. Soft Comput. 01(01), 30ā€“31 (2010)

    ArticleĀ  Google ScholarĀ 

  11. Esmaily, J., Moradinezhad, R.: Intrusion detection system based on multi-layer perceptron neural networks and decision tree. In: IKT 2015

    Google ScholarĀ 

  12. Zabra, Fariborz, Reza: Intrusion detection using neural nerworks trained by differencial evaluation algorithm

    Google ScholarĀ 

  13. Travallaee, M., Bagheri, E., Lu, W., Ghorbani, A.: A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Applications (CISDA 2009) (2009)

    Google ScholarĀ 

  14. Lorenzo Fonseca, I., MaciĆ” PĆ©rez, F., Lau FernĆ”ndez, R., et al.: MĆ©todo para la detecciĆ³n de intrusos mediante redes neuronales basado en la reducciĆ³n de caracterĆ­sticas. Centro de Estudios de IngenierĆ­a y Sistemas Instituto Superior PolitĆ©cnico JosĆ© Antonio EchevarrĆ­a (2008)

    Google ScholarĀ 

  15. De la Hoz Franco, E., De la Hoz Correa, E.M., Ortiz, A., Ortega, J.: Modelo de detecciĆ³n de intrusiones en sistemas de red, realizando selecciĆ³n de caracterĆ­sticas con FDR y entrenamiento y clasificaciĆ³n con SOM, vol. 8(1), pp. 85ā€“116, Octubre de 2012

    Google ScholarĀ 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Sergio OrdoƱez .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sergio OrdoƱez, G., Cesar Guerra, T. (2018). Prototype of a Security System with Artificial Intelligence Using Neural Networks and Evolutionary Algorithms. In: Torres Guerrero, F., Lozoya-Santos, J., Gonzalez Mendivil, E., Neira-Tovar, L., Ramƭrez Flores, P., Martin-Gutierrez, J. (eds) Smart Technology. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 213. Springer, Cham. https://doi.org/10.1007/978-3-319-73323-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-73323-4_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-73322-7

  • Online ISBN: 978-3-319-73323-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics