[1]蹇诗婕, 卢志刚, 杜丹, 等. 网络入侵检测技术综述[J]. 信息安全学报, 2020, 5(4): 96122[2]Kim J, Shin N, Jo S Y, et al. Method of intrusion detection using deep neural network[C] Proc of 2017 IEEE Int Conf on Big Data and Smart Computing (BigComp). Piscataway, NJ: IEEE, 2017: 313316[3]Tjhai G C, Papadaki M, Furnell S M, et al. Investigating the problem of IDS false alarms: An experimental study using Snort[C] Proc of IFIP Int Information Security Conf. Berlin: Springer, 2008: 253267[4]Luo Zhicheng, Dimg Weijia, Fu Anmin, et al. Highspeed network attack detection framework based on optimized feature selection[C] Proc of Int Conf on Security and Privacy in Digital Economy. Berlin: Springer, 2020: 6578[5]张博, 崔佳巍, 屈肃, 等. 高级持续性威胁及其重构研究进展与挑战[J]. 信息安全研究, 2021, 7(6): 512519[6]黄强, 鲁学仲, 运凯, 等. 基于多源告警信息关联的网路安全技防技术[J]. 信息安全研究, 2021, 7(11): 10411046[7]潘亚峰, 朱俊虎, 周天阳. APT攻击场景重构方法综述[J]. 信息工程大学学报, 2021, 22(1): 5560, 80[8]Hu Erteng, Fu Anmin, Zhang Zhiyi, et al. ACTracker: A fast and efficient attack investigation method based on event causality[C] Proc of IEEE Conf on Computer Communications Workshops (INFOCOM 2021). Piscataway, NJ: IEEE, 2021: 16[9]伏晓, 石进, 谢立. 用于自动证据分析的层次化入侵场景重构方法[J]. 软件学报, 2011, 22(5): 9961008[10]Milajerdi S M, Gjomemo R, Eshete B, et al. Holmes: Realtime apt detection through correlation of suspicious information flows[C] Proc of 2019 IEEE Symp on Security and Privacy (SP). Piscataway, NJ: IEEE, 2019: 11371152[11]Dain O, Cunningham R K. Fusing a heterogeneous alert stream into scenarios[G] Applications of Data Mining in Computer Security. Berlin: Springer, 2002: 103122[12]王硕, 汤光明, 王建华, 等. 基于因果知识网络的攻击场景构建方法[J]. 计算机研究与发展, 2018, 55(12): 26202636[13]Ye Nong, Zhang Yebin, Borror C M. Robustness of the Markovchain model for cyberattack detection[J]. IEEE Trans on Reliability, 2004, 53(1): 116123[14]Hassan W U, Guo S, Li D, et al. Nodoze: Combatting threat alert fatigue with automated provenance triage[C] Proc of Network and Distributed Systems Security Symp. San Diego, CA: ISOC, 2019[15]Zhu Z, Dumitras T. ChainSmith: Automatically learning the semantics of malicious campaigns by mining threat intelligence reports[C] Proc of 2018 IEEE European Symp on Security and Privacy (Euro S&P). Piscataway, NJ: IEEE, 2018: 458472[16]Bellas C, Naskos A, Kougka G, et al. A methodology for runtime detection and extraction of threat patterns[J]. SN Computer Science, 2020, 1: 113[17]孔斌, 吕遒健, 吴峥嵘. 数据驱动的网络安全风险事件预测技术研究[J]. 信息安全研究, 2019, 5(6): 477487
|