A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Security Audit Trail Analysis Using Harmony Search Algorithm
unpublished
Security Audit trail Analysis can be accomplished by searching audit trail logs of user activities for known attacks. The problem is a combinatorial optimization problem NP-Hard. Metaheuristics offer an alternative to solve this type of problems. In this paper, we propose to use Harmony Search metaheuristic as intrusion detection engine. It is a population-based evolutionary algorithm well suited for constrained optimization problems. Experimental results for simulated attacks are reported. The
fatcat:35ckumupvzadldupi6ve25grqa