参考文献
[1]邓桦, 宋甫元, 付玲, 等. 云计算环境下数据安全与隐私保护研究综述[J]. 湖南大学学报, 2022, 49(4): 110[2]彭祯方, 邢国强, 陈兴跃. 人工智能在网络安全领域的应用及技术综述[J]. 信息安全研究, 2022, 8(2): 110116[3]Spitzner L. Honeypots: Catching the insider threat[C] Proc of the 19th ANN Computer Security Application Conf. Piscataway, NJ: IEEE, 2003: 170179[4]Legg P A, Buckley O, Goldsmith M, et al. Caught in the act of an insider attack: Detection and assessment of insider threat[C] Proc of the 2015 IEEE Int Symp Technol Homeland Security. Piscataway, NJ: IEEE, 2015: 16[5]窦曼方. 基于大数据特征的入侵检测模型研究[D]. 兰州: 兰州理工大学, 2021[6]张文金, 覃仲宇, 冯钊, 等. 大数据下的Web暴力破解攻击检测[J]. 深圳大学学报, 2020, 37(Z1): 4449[7]Bansal A, Kaur S. Extreme gradient boosting based tuning for classification in intrusion detection systems[C] Proc of Int Conf on Advances in Computing and Data Sciences. Berlin: Springer, 2018: 372380[8]Catillo M, Rak M, Villano U. Discovery of DoS attacks by the ZEDIDS anomaly detector[J]. Journal of High Speed Networks, 2019, 25(4): 349365[9]Tama B A, Comuzzi M, Rhee K H. TSEIDS: A twostage classifier ensemble for intelligent anomalybased intrusion detection system[J]. IEEE Access, 2019, 7: 9449794507[10]Aguiar C, Leite D. Unsupervised fuzzy eIX: Evolving internalexternal fuzzy clustering[C] Proc of the 2020 IEEE Conf on Evolving and Adaptive Intelligent Systems. Piscataway, NJ: IEEE, 2020: 18[11]Dwivedi S, Vardhan M, Tripathi S. Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection[J]. Cluster Computer, 2021, 24(3): 18811900[12]Wazirali R. An improved intrusion detection system based on KNN Hyperparameter tuning and crossvalidation[J]. Arabian Journal for Science and Engineering, 2020, 45(12): 1085910873[13]Dempster A P, Laird N M, Rubin D B. Maximun likelihood estimation from incomplete data[J]. Journal of the Royal Statistical Society, 1977, 39(1): 138[14]王爱平, 张功营, 刘方. EM算法研究与应用[J]. 计算机技术与发展, 2009, 19(9): 108110[15]赵桂儒, 李卫东, 刘典婷, 等. EM算法的改进及其在行为识别中的应用[J]. 电视技术, 2014, 38(13): 196199[16]明泽, 宋文爱, 单纯, 等. 基于深度学习的网络恶意登录异常检测方法研究[J]. 中北大学学报, 2021, 42(4): 325331[17]鲁刚, 郭荣华, 周颖, 等. 恶意流量特征提取综述[C] 第33次全国计算机安全学术交流会论文集. 北京: 中国计算机学会, 2018: 19[18]魏琴芳, 杨子明, 胡向东, 等. 基于流量特征的登录账号密码暴力破解攻击检测方法[J]. 西南大学学报, 2017, 39(7): 149154[19]陈晓苏, 朱国胜, 肖道举. TCPIP协议族的安全架构[J]. 华中科技大学学报, 2001, 29(3): 1517[20]王方玉, 张建辉, 卜佑军, 等. 基于无监督机器学习的网络流量分类研究综述[J].信息工程大学学报, 2020, 21(6): 705710[21]Sharafaldin I, Lashkari A H, Ghorbani A A. Toward generating a new intrusion detection dataset and intrusion traffic characterization[C] Proc of the 4th Int Conf Information Systems Security Privacy. New York: Gordon & Breach Science Publishers, 2018: 108116[22]Attak H, Combalia M, Gardikis G, et al. Application of distributed computing and machine learningtechnologiesto cybersecurity[COL] Proc of Artificial Intelligence Cybersecurity. 2018 [20220911]. https:torsec.github.ioshieldh2020documentsscientificpapersCESAR2018_paper.pdf
|