[1] |
ROBERTS E . Bad bot report 2020:bad bots strike back[J]. Imperva Blog, 2020.
|
[2] |
BHUYAN M H , BHATTACHARYYA D K , KALITA J K . Network anomaly detection:methods,systems and tools[J]. IEEE Communications Surveys & Tutorials, 2013,16(1): 303-336.
|
[3] |
WIDIPUTRA H D . Clustering based intrusion detection for network profiling using k-means ecm and k-nearest neighbor[J]. Konferensi Nasional Sistem Dan Informatika, 2009: 247-251.
|
[4] |
ZANERO S , SAVARESI S M . Unsupervised learning techniques for an intrusion detection system[C]// Proceedings of the 2004 ACM Symposium on Applied Computing. 2004: 412-419.
|
[5] |
ALI A , SALEH A , RAMDAN T . Multilayer perceptrons networks for an intelligent adaptive intrusion detection system[J]. International Journal of Computer Science and Network Security, 2010,10(2): 275.
|
[6] |
KWON D , KIM H , KIM J ,et al. A survey of deep learning-based network anomaly detection[J]. Cluster Computing, 2019,22(1): 949-961.
|
[7] |
STALLINGS W . Network security essentials:applications and standards[M]. USA: Pearson, 2017.
|
[8] |
ZHANG F , WANG D . An effective feature selection approach for network intrusion detection[C]// 2013 IEEE Eighth International Conference on Networking,Architecture and Storage. 2013: 307-311.
|
[9] |
VIJAYANAND R , DEVARAJ D , KANNAPIRAN B . Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection[J]. Computers & Security, 2018,77: 304-314.
|
[10] |
LU X , LIU P , LIN J . Network traffic anomaly detection based on information gain and deep learning[C]// Proceedings of the 2019 3rd International Conference on Information System and Data Mining. 2019: 11-15.
|
[11] |
TANG T A , MHAMDI L , MC-LERNON D , et al . Deep learning approach for network intrusion detection in software defined networking[C]// 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM). 2016: 258-263.
|
[12] |
WANG J H , SEPTIAN T W . Combining oversampling with recurrent neural networks for intrusion detection[C]// International Conference on Database Systems for Advanced Applications. 2021: 305-320.
|
[13] |
HUBBALLI N , SURYANARAYANAN V . False alarm minimization techniques in signature-based intrusion detection systems:a survey[J]. Computer Communications, 2014,49: 1-17.
|
[14] |
MUNA A L H , MOUSTAFA N , SITNIKOVA E . Identification of malicious activities in industrial internet of things based on deep learning models[J]. Journal of Information Security and Applications, 2018,41: 1-11.
|
[15] |
AHMIM A , MAGLARAS L , FERRAG M A ,et al. A novel hierarchical intrusion detection system based on decision tree and rules-based models[C]// 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS). 2019: 228-233.
|
[16] |
YIN C , ZHU Y , FEI J ,et al. A deep learning approach for intrusion detection using recurrent neural networks[J]. IEEE Access, 2017,5: 21954-21961.
|
[17] |
ZHANG J , LING Y , FU X ,et al. Model of the intrusion detection system based on the integration of spatial-temporal features[J]. Computers & Security, 2020,89:101681.
|
[18] |
LIU X , LIU J . Malicious traffic detection combined deep neural network with hierarchical attention mechanism[J]. Scientific Reports, 2021,11(1): 1-15.
|
[19] |
ZHOU D , HUANG J , SCH?LKOPF B . Learning with hypergraphs:clustering,classification,and embedding[C]// Twentieth Annual Conference on Neural Information Processing Systems(NIPS 2006). 2007: 1601-1608.
|
[20] |
KIPF T N , WELLING M . Semi-supervised classification with graph convolutional networks[J]. arXiv Preprint arXiv:1609.02907, 2016.
|
[21] |
FENG Y , YOU H , ZHANG Z ,et al. Hypergraph neural networks[C]// Proceedings of the AAAI Conference on Artificial Intelligence. 2019: 3558-3565.
|
[22] |
KARPATHY A . The unreasonable effectiveness of recurrent neural networks[J]. Andrej Karpathy Blog, 2015,21:23.
|
[23] |
BERGE C . Hypergraphs:combinatorics of finite sets[M]. Elsevier, 1984.
|
[24] |
GASTI P , TSUDIK G , UZUN E ,et al. DoS and DDoS in named data networking[C]// 2013 22nd International Conference on Computer Communication and Networks (ICCCN). 2013: 1-7.
|
[25] |
ZAREMBA W , SUTSKEVER I , VINYALS O . Recurrent neural network regularization[J]. arXiv Preprint arXiv:1409.2329, 2014.
|
[26] |
TAVALLAEE M , BAGHERI E , LU W ,et al. A detailed analysis of the KDD CUP 99 data set[C]// 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. 2009: 1-6.
|
[27] |
MOUSTAFA N , SLAY J . UNSW-NB15:a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)[C]// 2015 Military Communications and Information Systems Conference (MilCIS). 2015: 1-6.
|
[28] |
MOUSTAFA N , SLAY J . The evaluation of network anomaly detection systems:statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set[J]. Information Security Journal:A Global Perspective, 2016,25(1-3): 18-31.
|
[29] |
MOUSTAFA N , SLAY J , CREECH G . Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks[J]. IEEE Transactions on Big Data, 2017,5(4): 481-494.
|
[30] |
MOUSTAFA N , CREECH G , SLAY J . Big data analytics for intrusion detection system:statistical decision-making using finite dirichlet mixture models[M]// Data Analytics and Decision Support for Cybersecurity. 2017: 127-156.
|
[31] |
SARHAN M , LAYEGHY S , MOUSTAFA N ,et al. Netflow datasets for machine learning-based network intrusion detection systems[M]// Big Data Technologies and Applications. 2020: 117-135.
|
[32] |
SHARAFALDIN I , LASHKARI A H , GHORBANI A A . Toward generating a new intrusion detection dataset and intrusion traffic characterization[C]// ICISSP. 2018: 108-116.
|