参考文献
|
-
https://github.com/somethingnew2-0/CS642-HW2/blob/master/traces/synflood.pcap, A vailable: 2019/02/22, Available: 2019/02/22.
-
https://sites.google.com/a/uah.edu/tommy-morris-uah/ics-data-sets, Available: 2019/02/22.
-
http://www.unb.ca/research/iscx/dataset/iscx-NSL-KDDdataset.html, Available: 2019/02/22.
-
https://github.com/onty/trace-samples/blob/master/DIAMETER/ESy/EsyAndGy-Normal.pcap, Available: 2019/02/22, Available: 2019/02/22.
-
https://github.com/VishwaPrabhakar/MaliciousIPScanner/blob/master/goldeneye.pcap, Available: 2019/02/22, Available: 2019/02/22
-
https://www.dropbox.com/sh/kk24ewnqi9qjdvt/AAAz0ySsffUi8B8yoPSE5kc3a/pcaps?dl=0, Available: 2019/02/22
-
Ashfaq, R. A. R.,Wang, X. Z.,Huang, J. Z.,Abbas, H.,He, Y. L.(2017).Fuzziness based semi-supervised learning approach for intrusion detection system.Information Sciences,378,484-497.
-
Blum, C.,Roli, A.(2003).Metaheuristics in combinatorial optimization: Overview and conceptual comparison.ACM Computing Surveys,35(3),268-308.
-
Burguera, I.,Zurutuza, U.,Nadjm-Tehrani, S.(2011).Crowdroid: Behavior-based malware detection system for android.Proceedings of the ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
-
Casas, P.,Mazel, J.,Owezarski, P.(2012).Unsupervised network intrusion detection systems: Detecting the unknown without knowledge.Computer Communications,35,772-783.
-
Chen, Z.H.,Tsai, C.W.(2018).An Effective Metaheuristic Algorithm for Intrusion Detection System.Proceedings of the IEEE International Conference on Smart Internet of Things
-
Depren, O.,Topallar, M.,Anarim, E.,Ciliz, M. K.(2005).An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks.Expert Systems with Applications,29(4),713-722.
-
Kashef, S.,Nezamabadi-pour, H.(2015).An advanced ACO algorithm for feature subset selection.Neurocomputing,147,271-279.
-
Kuang, F.,Xu, W.,Zhang, S.(2014).A novel hybrid KPCA and SVM with GA model for intrusion detection.Applied Soft Computing,18,178-184.
-
Lee, K. C.,Mikhailov, L.(2004).Intelligent intrusion detection system.Proceedings of the International IEEE Conference on Intelligent Systems
-
Liao, H. J.,Lin, C. H. R.,Lin, Y. C.,Tung, K. Y.(2013).Intrusion detection system: A comprehensive review.Network and Computer Applications,36(1),16-24.
-
Lin, S. W.,Ying, K. C.,Chen, S. C.,Lee, Z. J.(2008).Particle swarm optimization for parameter determination and feature selection of support vector machines.Expert Systems with Applications,35(4),1817-1824.
-
Lunt, T. F.(1993).A survey of intrusion detection techniques.Computers & Security,12(4),405-418.
-
Mairh, A.,Barik, D.,Verma, K.,Jena, D.(2011).Honeypot in network security: A survey.Proceedings of the International Conference on Communication, Computing & Security
-
Michel, C.,Mé, L.(2001).ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection.Proceedings of the IFIP International Information Security Conference
-
Patel, A.,Taghavi, M.,Bakhtiyari, K.,Júnior, J. C.(2013).An intrusion detection and prevention system in cloud computing: A systematic review.Journal of Network and Computer Applications,36(1),25-41.
-
Ring, M.,Wunderlich, S.,Grdl, D.,Landes, D.,Hotho, A.(2017).Flow-based benchmark data sets for intrusion detection.Proceedings of the 16th European Conference on Cyber Warfare and Security
-
Saied, A.,Overill, R. E.,Radzik, T.(2016).Detection of known and unknown DDOS attacks using artificial neural networks.Neurocomputing,172,385-393.
-
Stallings, W.,Brown, L.(2014).Incident Response: Computer Security Principles and Practice.Prentice Hall Press.
-
Stein, G.,Chen, B.,Wu, A. S.,Hua, K. A.(2005).Decision tree classifier for network intrusion detection with GA-based feature selection.Proceedings of the Annual Southeast Regional Conference
-
Tsai, C. W.(2016).An effective WSN deployment algorithm via search economics.Computer Networks,101,178-191.
-
Tsai, C.W.(2013).Incremental Particle Swarm Optimization for Intrusion Detection.IET Networks,2(3),124-130.
-
Vilela, D. W. F. L.,Ferreira, E. W. T.,Shinoda, A. A.,de Souza Arajo, N. V.,de Oliveira, R.,Nascimento, V. E.(2014).A dataset for evaluating intrusion detection systems in IEEE 802.11 wireless networks.Proceedings of the IEEE Colombian Conference on Communications and Computing
|