[1] |
WU S X , BANZHAF W W . The use of computational intelligence in intrusion detection systems:a review[J]. Applied Soft Computing, 2010,10(1): 1-35.
|
[2] |
ZHU J M , RAGHUNATHAN S . Evaluation model of information security technologies based on game theoretic[J]. Chinese Journal of Computers, 2009,32(4): 828-834.
|
[3] |
RHEE H , RYU Y . Evaluation of intrusion detection systems under a resource constraint[J]. ACM Transaction on Information and System Security, 2008,11(4): 95-118.
|
[4] |
CAVUSOGLU H , RAGHUNATHAN M S . The value of intrusion detection systems in information technology security architecture[J]. Information Systems Research, 2005,16(1): 28-46.
|
[5] |
TIAN Y L , LI Q X , HU J ,et al. Secure limitation analysis of public-key cryptography for smart card settings[J]. World Wide Web, 2020(23): 1423-1440.
|
[6] |
SUBBA B , BISWAS S , KARMAKAR S . False alarm reduction in signature-based IDS:game theory approach[J]. Security and Communication Networks, 2016,9(18): 4865-4881.
|
[7] |
ANDERSON J P . Computer security threat monitoring and surveillance[Z].[S.n.:s.l.],(1980-04-15)[2020-03-24]. [S.n.:s.l.],
|
[8] |
DENNING D E . An intrusion-detection model[J]. IEEE Transactions on Software Engineering, 1987,13(2): 222-232.
|
[9] |
ATHANASIADES N , ABLER R , LEVINE J ,et al. Intrusion detection testing and benchmarking methodologies[J]. IEEE Proceedings First IEEE International Workshop on Information Assurance, 2003: 63-72.
|
[10] |
JIANG J C , MA H T , REN D E ,et al. A survey of intrusion detection research on network security[J]. Journal of Software, 2000,11(11): 1460-1466.
|
[11] |
PAXSON V . Bro:a system for detecting network intruders in realtime[J]. Computer Networks, 1999,31(23-24): 2435-2463.
|
[12] |
GARCíA-TEODORO P , DíAZ-VERDEJO P , MACIá-FERNáNDEZ G .et al. Anomaly-based network intrusion detection:techniques,systems and challenges[J]. Computers & Security, 2009,28(1-2): 18-28.
|
[13] |
LIN W C , KE S W , TSAI C F . CANN:an intrusion detection system based on combining cluster centers and nearest neighbors[J]. Knowledge-Based Systems, 2015,78: 13-21.
|
[14] |
CHEN P , DESMET L , HUYGENS C . A study on advanced persistent threats[C]// 15th International Conference on Communications and Multimedia Security. New York:ACM Press, 2014: 63-72.
|
[15] |
FRIEDBERG I , SKOPIK F , SETTANNI G ,et al. Combating advanced persistent threats[J]. Computers & Security, 2015,48(C): 35-57.
|
[16] |
ZHANG Y , PAN X M , QING Z L ,et al. APT attacks and defenses[J]. Journal of Tsinghua University (Science and Technology), 2017(11): 10-16.
|
[17] |
RUBIO J E , ALCARAZ C , ROMAN R ,et al. Current cyber-defense trends in industrial control systems[J]. Computers & Security, 2019:87.
|
[18] |
LUH R , JANICKE H , SCHRITTWIESER S . AIDIS:detecting and classifying anomalous behavior in ubiquitous kernel processes[J]. Computers & Security, 2019(84): 120-147.
|
[19] |
MOON D , IM H , KIM I ,et al. DTB-IDS:an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks[J]. The Journal of Supercomputing, 2015(73): 1-15.
|
[20] |
VRIES J D , HOOGSTRAATEN H , BERG J V D ,et al. Systems for detecting advanced persistent threats:a development roadmap using intelligent data analysis[C]// International Conference on Cyber Security. Piscataway:IEEE Press, 2013.
|
[21] |
PIETRASZEK T , . Using adaptive alert classification to reduce false positives in intrusion detection[C]// International Workshop on Recent Advances in Intrusion Detection—RAID 2004. Berlin:Springer, 2004: 102-124.
|
[22] |
HACHMI F , BOUJENFA K , LIMAM M . Enhancing the accuracy of intrusion detection systems by reducing the rates of false positives and false negatives through multi-objective optimization[J]. Journal of Network & Systems Management, 2019,27(1): 93-120.
|
[23] |
ZONOUZ S A , KHURANA H , SANDERS W H ,et al. RRE:a game-theoretic intrusion Response and Recovery Engine[J]. IEEE Transactions on Parallel and Distributed systems, 2013,25(2): 395-406.
|
[24] |
CUPPENS N , CUPPENS F , VERAGRA J ,et al. An ontology-based approach to react to network attacks[J]. International Journal of Information & Computer Security, 2008,3(3/4): 280-305.
|
[25] |
吴姚睿, 刘淑芬 . 基于攻击群模型的协同入侵的响应方法[J]. 电子学报, 2009,37(11): 2416-2419.
|
|
WU Y R , LIU S F . A response method for cooperative intrusions based on the attack group model[J]. Acta Electronica Sinica, 2009,37(11): 2416-2419.
|
[26] |
TIAN Y L , GUO J , WU Y L ,et al. Towards attack and defense views of rational delegation of computation[J]. IEEE Access, 2019,PP(99):1.
|
[27] |
杨义先, 钮心忻 . 安全通讯[M]. 北京: 电子工业出版社, 2018.
|
|
YANG Y X , NIU X X . The general theory of information security[M]. Beijing: Publishing House of Electronics IndustryPress, 2018.
|
[28] |
LIN W C , KE S W , TSAI C F . CANN:an intrusion detection system based on combining cluster centers and nearest neighbors[J]. Knowledge-Based Systems, 2015(78): 13-21.
|
[29] |
MOUSTAFA N , SLAY J . UNSW-NB15:a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)[C]// 2015 Military Communications and Information Systems Conference. Piscataway:IEEE Press, 2015: 1-6.
|
[30] |
MOUSTAFA N , SLAY J . The evaluation of network anomaly detection systems:statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set[J]. Information Security Journal A Global Perspective, 2016,25(1-3): 1-14.
|
[31] |
彭凌西, 谢冬青, 付颖芳 ,等. 基于危险理论的自动入侵响应系统模型[J]. 通信学报, 2012,33(1): 136-144.
|
|
PENG L X , XIE D Q , FU Y F ,et al. Automated intrusion response system model based on danger theory[J]. Journal on Communications, 2012,33(1): 136-144.
|