[1] |
LEE W , STOLFO S J , MOK K W . A data mining framework for building intrusion detection models[C]// The IEEE Symposium on Security and Privacy. c1999: 120-132.
|
[2] |
VERWOERD T , HUNT R . Intrusion detection techniques and ap-proaches[J]. Computer Communications, 2002, 25(15): 1356-1365.
|
[3] |
ENDORF C F , SCHULTZ E , MELLANDER J . Intrusion detection&prevention[M]. McGraw-Hill Osborne Media, 2004.
|
[4] |
LIAO H J , LIN C H R , LIN Y C , et al. Intrusion detection system:a comprehensive review[J]. Journal of Network and Computer Ap-plications, 2013, 36(1): 16-24.
|
[5] |
SHYU M L , CHEN S C , SARINNAPAKORN K , et al. A novel anomaly detection scheme based on principal component classi-fier[R]. Coral Gables Department of Electrical and Computer En-gineering of Miami University, 2003.
|
[6] |
JAMDAGNI A , TAN Z , HE X , et al. Repids:a multi tier real-time payload-based intrusion detection system[J]. Computer Networks, 2013, 57(3): 811-824.
|
[7] |
胡志鹏, 魏立线, 申军伟 , 等. 基于核 Fisher 判别分析的无线传感器网络入侵检测算法[J]. 传感技术学报, 2012(2): 246-250.
|
|
HU Z P , WEI L X , SHEN J W , et al. An intrusion detection algo-rithm for wsn based on kernel Fisher discriminant[J]. Chinese Jour-nal of Sensors and Actuators, 2012(2): 246-250.
|
[8] |
MOK M S , SOHN S Y , JU Y H . Random effects logistic regression model for anomaly detection[J]. Expert Systems with Applications, 2010, 37(10): 7162-7166.
|
[9] |
郭春 . 基于数据挖掘的网络入侵检测关键技术研究[D]. 北京: 北京邮电大学, 2014.
|
|
GUO C . Research on key technologies of network intrusion detec-tion based on data mining[D]. Beijing: Beijing University of Posts and Telecommunications, 2014.
|
[10] |
LEE W , STOLFO S J , MOK K W , et al. Adaptive intrusion detection:a data mining approach[J]. Artificial Intelligence Review, 2000, 14(6): 533-567.
|
[11] |
HWANG T S , LEE T J , LEE Y J . A three-tier IDS via data mining approach[C]// The 3rd Annual ACM Workshop on Mining Network Data. c2007: 1-6.
|
[12] |
AN W , LIANG M . A new intrusion detection method based on SVM with minimum within class scatter[J]. Security and Commu-nication Networks, 2013, 6(9): 1064-1074.
|
[13] |
MUKKAMALA S , JANOSKI G , SUNG A . Intrusion detection using neural networks and support vector machines[C]// The 2002 International Joint Conference on Neural Networks(IJCNN'02). c2002: 1702-1707.
|
[14] |
GAN X S , DUANMU J S , WANG J F , et al. Anomaly intrusion detection based on PLS feature extraction and core vector ma-chine[J]. Knowledge-Based Systems, 2013(40): 1-6.
|
[15] |
叶钢, 余丹, 李重文 , 等. 一种基于Kolmogorov-Smirnov检验的缺陷定位方法[J]. 计算机研究与发展, 2013(4): 686-699.
|
|
YE G , YU D , LI C W , et al. Fault localization based on Kolmo-gorov-Smirnov testing model[J]. Journal of Computer Research and Development, 2013(4): 686-699.
|
[16] |
从飞云, 陈进, 董广明 . 基于AR模型的Kolmogorov-Smirnov检验性能退化及预测研究[J]. 振动与冲击, 2012(10): 79-82.
|
|
CONG F Y , CHEN J , DONG G M . Performance degradation as-sessment by Kolmogorov-Smirnov test and prognosis based on AR model[J]. Journal of Vibration and Shock, 2012(10): 79-82.
|
[17] |
陈敏 . 门限自回归模型条件异方差的 Kolmogorov-Smirnov检验[J]. 应用数学学报, 2002(4): 577-590.
|
|
CHEN M . A Kolmogorov-Smirnov test of conditional heterosce-dasticity for threshold autoregressive models[J]. Acta Mathematicae Applicatae Sinica, 2002(4): 577-590.
|
[18] |
李蕊 . 基于PCA和LOGIT模型的网络入侵检测方法[J]. 成都信息工程学院学报, 2014(3): 261-267.
|
|
LI R . A network intrusion detection method based on PCA and LOGIT model[J]. Journal of Chengdu University of Information Technology, 2014(3): 261-267.
|
[19] |
LIN W C , KE S W , TSAI C F . CANN:an intrusion detection sys-tem based on combining cluster centers and nearest neighbors[J]. Knowledge-based systems, 2015, 7(8): 13-21.
|