[1] |
BREIMAN L . Random forests[J]. Machine Learning, 2001,45(1): 5-32.
|
[2] |
ZHANG G P . Neural networks for classification:a survey[J]. IEEE Transactions on Systems,Man,and Cybernetics,Part C (Applications and Reviews), 2000,30(4): 451-462.
|
[3] |
朱应武, 杨家海, 张金祥 . 基于流量信息结构的异常检测[J]. 软件学报, 2010,21(10): 2573-2583.
|
|
ZHU Y W , YANG J H , ZHANG J X . Anomaly detection based on traffic information structure[J]. Journal of Software, 2010,21(10): 2573-2583.
|
[4] |
WANG G , HAO J , MA J ,et al. A new approach to intrusion detection using artificial neural networks and fuzzy clustering[J]. Expert Systems with Applications, 2010,37(9): 6225-6232.
|
[5] |
麻文刚, 张亚东, 郭进 . 基于LSTM与改进残差网络优化的异常流量检测方法[J]. 通信学报, 2021,42(5): 23-40.
|
|
MA W G , ZHANG Y D , GUO J . Abnormal traffic detection method based on LSTM and improved residual neural network optimization[J]. Journal on Communications, 2021,42(5): 23-40.
|
[6] |
高妮, 高岭, 贺毅岳, 王海 . 基于自编码网络特征降维的轻量级入侵检测模型[J]. 电子学报, 2017,45(3): 730-739.
|
|
GAO N , GAO L , HE Y Y , WANG H . A lightweight intrusion detection model based on antoencoder network with feature reduction[J]. Acta Electronica Sinica, 2017,45(3): 730-739.
|
[7] |
TAVALLAEE M , BAGHERI E , LU W ,et al. A detailed analysis of the KDD CUP 99 data set[C]// 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. 2009: 1-6.
|
[8] |
ZHANG J , LING Y , FU X ,et al. Model of the intrusion detection system based on the integration of spatial-temporal features[J]. Computers & Security, 2020,89:101681.
|
[9] |
FENG X , SUN R , ZHU X ,et al. Snipuzz:black-box fuzzing of IoT firmware via message snippet inference[C]// Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 2021: 337-350.
|
[10] |
SHEKARI T , IRVENE C , CARDENAS A A ,et al. MaMIoT:Manipulation of energy market leveraging high wattage IoT botnets[C]// Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 2021: 1338-1356.
|
[11] |
REZAEI A . Using ensemble learning technique for detecting botnet on IoT[J]. SN Computer Science, 2021,2(3): 1-14.
|
[12] |
韩春雨, 张永铮, 张玉 . Fast-flucos:基于 DNS 流量的 Fast-flux恶意域名检测方法[J]. 通信学报, 2020,41(5): 37-47.
|
|
HAN C Y , ZHANG Y Z , ZHANG Y . Fast-flucos:malicious domain name detection method for fast-flux based on DNS traffic[J]. Journal on Communications, 2020,41(5): 37-47.
|
[13] |
HAN X , PASQUIER T , BATES A ,et al. Unicorn:runtime provenance-based detector for advanced persistent threats[J]. arXiv preprint arXiv:2001.01525, 2020.
|
[14] |
ZHANG J , LING Y , FU X ,et al. Model of the intrusion detection system based on the integration of spatial-temporal features[J]. Computers & Security, 2020,89:101681.
|
[15] |
PAXSON V . Bro:a system for detecting network intruders in real-time[J]. Computer Networks, 1999,31(23-24): 2435-2463.
|
[16] |
Flowmeter[EB].
|
[17] |
GOGOI P , BHUYAN M H , BHATTACHARYYA D K ,et al. Packet and flow based network intrusion dataset[C]// International Conference on Contemporary Computing. 2012: 322-334.
|
[18] |
COMBS G . Tshark:Dump and analyze network traffic[J]. Wireshark, 2012.
|
[19] |
GARCIA S , PARMISANO A , ERQUIAGA M J . IoT-23:a labeled dataset with malicious and benign IoT network traffic[R]. Stratosphere Lab. 2020.
|
[20] |
VACCARI I , CHIOLA G , AIELLO M ,et al. MQTTset,a new dataset for machine learning techniques on MQTT[J]. Sensors, 2020,20(22): 6578.
|
[21] |
何红艳, 黄国言, 张炳 ,等. 基于多种特征选择策略的入侵检测模型研究[J]. 信息安全研究, 2021,7(3): 225-232.
|
|
HE H Y , HUANG G Y , ZHANG B ,et al. Research on intrusion detection model based on multiple feature selection strategies[J]. Information Security Research, 2021,7(3): 225-232.
|