|   Miller Z , Hu W . Data stream subspace clustering for anomalous network packet detection[J]. Journal of Information Security, 2012, 3(3):215-223
[2]	Copeland J A, Jerrim J. Packet sampling flow-based detection of network intrusions: US Patent7512980[P]. 2009-03-31
[3]	Radware.2018—2019 Global application & network security report. [EB/OL].(2019-01-18)[2020-08-01].https://www.radware.com/ert-report-2018 
[4]	Shigemoto T, Fujii S, Kuriama I, et al. Development of white list based autonomous evolution of defense system for RAT malware[C]//Proc of the 13th Asia Joint Conference on Information Security. Piscataway,NJ:IEEE, 2018: 95-101
[5]	George D, Lehrach W, Kansky K, et al. A generative vision model that trains with high data efficiency and breaks text-based CAPTCHAs[J]. Science, 2017, 358(6368): eaag2612
[6]	Jain A K, Gupta B B. A novel approach to protect against phishing attacks at client side using auto-updated white-list[J]. EURASIP Journal on Information Security, 2016, 2016(1): 9
[7]	Han W, Cao Y, Bertino E, et al. Using automated individual white-list to protect web digital identities[J]. Expert Systems with Applications, 2012, 39(15): 11861-11869
[8]	Shah B, Dave K. SIP based intrusion detection system for VoIP based applications[C]//Proc of the 2nd Int Conf on Information and Communication Technology for Competitive Strategies. New York:ACM, 2016: 28
[9]	Gudipati V K, Vetwal A, Kumar V, et al. Detection of Trojan Horses by the analysis of system behavior and data packets[C]//Proc of 2015 Long Island Systems, Applications and Technology. Piscataway,NJ:IEEE, 2015: 1-4
[10]	Zhang Z, George R, Shujaee K. An Approach to Malicious Payload Detection[C]//Proc of 2018 World Automation Congress. Piscataway,NJ :IEEE, 2018: 1-5
[11]	Aburada K, Arikawa Y, Usuzaki S, et al. Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic[J]. Artificial Life and Robotics, 2019: 1-6
[12]	Zhang X, Zhu P, Tian J, et al. An effective semi-supervised model for intrusion detection using feature selection based LapSVM[C]//Proc of 2017 Int Cconf on Computer, Information and Telecommunication Systems. Piscataway, NJ: IEEE, 2017: 283-286
[13]	Yang L, Cai M, Duan Y, et al. Intrusion detection based on approximate information entropy for random forest classification[C]//Proc of the 4th Int Conf on Big Data and Computing. New York:ACM,2019: 125-129
[14]	Choi H, Kim M, Lee G, et al. Unsupervised learning approach for network intrusion detection system using autoencoders[J]. The Journal of Supercomputing, 2019, 75(9): 5597-5621
[15]	Sharma S K, Pandey P, Tiwari S K, et al. An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification[C]//Proc of IEEE Int Conf on Advances In Engineering, Science And Management. Piscataway, NJ : IEEE, 2012: 417-422
[16]	Kumar S. Survey of current network intrusion detection techniques[J]. Washington Univ. in St. Louis, 2007: 1-18
[17]	Moustafa N, Slay J. The evaluation of network anomaly detection systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set[J]. Information Security Journal: A Global Perspective, 2016, 25(1/2/3): 18-31
[18]	University of New Brunswick. ICIDS2017 [DB/OL]. Fredericton, Canada: Canadian Institute for Cybersecurity, 2017[2020-08-01].
 |