Miller Z , Hu W . Data stream subspace clustering for anomalous network packet detection[J]. Journal of Information Security, 2012, 3(3):215-223
[2] Copeland J A, Jerrim J. Packet sampling flow-based detection of network intrusions: US Patent7512980[P]. 2009-03-31
[3] Radware.2018—2019 Global application & network security report. [EB/OL].(2019-01-18)[2020-08-01].https://www.radware.com/ert-report-2018
[4] Shigemoto T, Fujii S, Kuriama I, et al. Development of white list based autonomous evolution of defense system for RAT malware[C]//Proc of the 13th Asia Joint Conference on Information Security. Piscataway,NJ:IEEE, 2018: 95-101
[5] George D, Lehrach W, Kansky K, et al. A generative vision model that trains with high data efficiency and breaks text-based CAPTCHAs[J]. Science, 2017, 358(6368): eaag2612
[6] Jain A K, Gupta B B. A novel approach to protect against phishing attacks at client side using auto-updated white-list[J]. EURASIP Journal on Information Security, 2016, 2016(1): 9
[7] Han W, Cao Y, Bertino E, et al. Using automated individual white-list to protect web digital identities[J]. Expert Systems with Applications, 2012, 39(15): 11861-11869
[8] Shah B, Dave K. SIP based intrusion detection system for VoIP based applications[C]//Proc of the 2nd Int Conf on Information and Communication Technology for Competitive Strategies. New York:ACM, 2016: 28
[9] Gudipati V K, Vetwal A, Kumar V, et al. Detection of Trojan Horses by the analysis of system behavior and data packets[C]//Proc of 2015 Long Island Systems, Applications and Technology. Piscataway,NJ:IEEE, 2015: 1-4
[10] Zhang Z, George R, Shujaee K. An Approach to Malicious Payload Detection[C]//Proc of 2018 World Automation Congress. Piscataway,NJ :IEEE, 2018: 1-5
[11] Aburada K, Arikawa Y, Usuzaki S, et al. Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic[J]. Artificial Life and Robotics, 2019: 1-6
[12] Zhang X, Zhu P, Tian J, et al. An effective semi-supervised model for intrusion detection using feature selection based LapSVM[C]//Proc of 2017 Int Cconf on Computer, Information and Telecommunication Systems. Piscataway, NJ: IEEE, 2017: 283-286
[13] Yang L, Cai M, Duan Y, et al. Intrusion detection based on approximate information entropy for random forest classification[C]//Proc of the 4th Int Conf on Big Data and Computing. New York:ACM,2019: 125-129
[14] Choi H, Kim M, Lee G, et al. Unsupervised learning approach for network intrusion detection system using autoencoders[J]. The Journal of Supercomputing, 2019, 75(9): 5597-5621
[15] Sharma S K, Pandey P, Tiwari S K, et al. An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification[C]//Proc of IEEE Int Conf on Advances In Engineering, Science And Management. Piscataway, NJ : IEEE, 2012: 417-422
[16] Kumar S. Survey of current network intrusion detection techniques[J]. Washington Univ. in St. Louis, 2007: 1-18
[17] Moustafa N, Slay J. The evaluation of network anomaly detection systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set[J]. Information Security Journal: A Global Perspective, 2016, 25(1/2/3): 18-31
[18] University of New Brunswick. ICIDS2017 [DB/OL]. Fredericton, Canada: Canadian Institute for Cybersecurity, 2017[2020-08-01].
|