[1] |
LIAO H J , LIN C H R , LIN Y C ,et al. Intrusion detection system:a comprehensive review[J]. Journal of Network & Computer Applications, 2013,36(1): 16-24.
|
[2] |
KIM K , AMINANTO M E . Deep learning in intrusion detection perspective:Overview and further challenges[C]// International Workshop on Big Data & Information Security. Piscataway:IEEE Press, 2018: 5-10.
|
[3] |
TANG T A , MHAMDI L , MCLERNON D ,et al. Deep learning approach for network intrusion detection in software defined networking[C]// International Conference on Wireless Networks & Mobile Communications. Piscataway:IEEE Press, 2016,doi:10.1109/WINCOM.2016.7777224.
|
[4] |
GU G X , CHEN C T , BUEHLER M J . De novo composite design based on machine learning algorithm[J]. Extreme Mechanics Letters, 2017,18: 19-28.
|
[5] |
VINAYAKUMAR R , SOMAN K P , POORNACHANDRAN P . Applying convolutional neural network for network intrusion detection[C]// 2017 International Conference on Advances in Computing,Communications and Informatics . Piscataway:IEEE Press, 2017,doi:10.1109/ICACCI.2017.8126009.
|
[6] |
AL-ZEWAIRI M , ALMAJALI S , AWAJAN A . Experimental evaluation of a multi-layer feed-forward artificial neural network classifier for network intrusion detection system[C]// The 2017 International Conference on New Trends in Computing Sciences. Piscataway:IEEE Press, 2018: 167-172.
|
[7] |
VINAYAKUMAR R , ALAZAB M , KP S ,et al. Deep learning approach for intelligent intrusion detection system[J]. IEEE Access, 2019PP(99): 1-1.
|
[8] |
AZIZJON M , JUMABEK A , KIM W . 1D CNN based network intrusion detection with normalization on imbalanced data[C]// 2020 International Conference on Artificial Intelligence in Information and Communication . Piscataway:IEEE Press, 2020,doi:10.1109/ICAIIC48513.2020.9064976.
|
[9] |
KIM J , KIM J , THU H L T ,et al. Long short term memory recurrent neural network classifier for intrusion detection[C]// International Conference on Platform Technology & Service. Piscataway:IEEE Press, 2016,doi:10.1109/PlatCon.2016.7456805.
|
[10] |
CHEN Y , ABRAHAM A , YANG J . Feature selection and intrusion detection using hybrid flexible neural tree[C]// International Symposium on Neural Networks. Berlin:Springer, 2005: 439-444.
|
[11] |
SABOUR S , FROSST N , HINTON G E . Dynamic routing between capsules[C]// Proceeding of the Neural Information Processing Systems. New York:ACM Press, 2017: 3856-3866.
|
[12] |
HINTON G E , SABOUR S , FROSST N . Matrix capsules with EM routing[C]// Sixth International Conference on Learning Representations. 2018: 1-9.
|
[13] |
TAY Y , BAHRI D , METZLER D ,et al. Synthesizer:rethinking self-attention in transformer models[J]. arXiv Preprint,arXiv:2005.00743v1, 2020
|
[14] |
TAVALLAEE M , BAGHERI E , LU W ,et al. A detailed analysis of the KDD CUP 99 data set[C]// 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. Piscataway:IEEE Press, 2009: 1-6.
|
[15] |
DHANABAL L , SHANTHARAJAH S P . A study on NSL-KDD dataset for intrusion detection system based on classification algorithms[J]. International Journal of Advanced Research in Computer and Communication Engineering, 2015,4(6): 446-452.
|
[16] |
MOUSTAFA N , SLAY J . UNSW-NB15:a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)[C]// Military Communications and Information Systems Conference. Piscataway:IEEE Press, 2015:16.
|
[17] |
DONG B , WANG X . Comparison deep learning method to traditional methods using for network intrusion detection[C]// IEEE International Conference on Communication Software & Networks. Piscataway:IEEE Press, 2016: 581-585.
|