An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things
暂无分享,去创建一个
[1] Hui-Tang Lin,et al. DBod: Clustering and detecting DGA-based botnets using DNS traffic analysis , 2017, Comput. Secur..
[2] Radu State,et al. A Big Data Architecture for Large Scale Security Monitoring , 2014, 2014 IEEE International Congress on Big Data.
[3] Wentao Shang. Challenges in IoT Networking via TCP / IP Architecture , 2016 .
[4] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[5] Ali Dehghantanha,et al. A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.
[6] Fabio Roli,et al. An approach to the automatic design of multiple classifier systems , 2001, Pattern Recognit. Lett..
[7] Ali Dehghantanha,et al. Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning , 2019, IEEE Transactions on Sustainable Computing.
[8] Wentao Ma,et al. Estimator with forgetting factor of correntropy and recursive algorithm for traffic network prediction , 2013, 2013 25th Chinese Control and Decision Conference (CCDC).
[9] Li Zhang,et al. Hybrid decision tree and naïve Bayes classifiers for multi-class classification tasks , 2014, Expert Syst. Appl..
[10] A. Nur Zincir-Heywood,et al. Benchmarking the Effect of Flow Exporters and Protocol Filters on Botnet Traffic Classification , 2016, IEEE Systems Journal.
[11] Ajith Abraham,et al. Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..
[12] Mohamed Nassar,et al. Secure Outsourcing of Network Flow Data Analysis , 2013, 2013 IEEE International Congress on Big Data.
[13] Sherif Abdelwahed,et al. A Model-Based Validated Autonomic Approach to Self-Protect Computing Systems , 2014, IEEE Internet of Things Journal.
[14] Dilip Sarkar,et al. The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks , 2016, 2016 IEEE 41st Conference on Local Computer Networks (LCN).
[15] Yacine Bouzida,et al. Neural networks vs . decision trees for intrusion detection , 2006 .
[16] Georgios Kambourakis,et al. DNS amplification attack revisited , 2013, Comput. Secur..
[17] Jill Slay,et al. Flow Aggregator Module for Analysing Network Traffic , 2018 .
[18] Jian Ma,et al. Sentiment classification: The contribution of ensemble learning , 2014, Decis. Support Syst..
[19] Leonardo B. Oliveira,et al. Defending Internet of Things against Exploits , 2015, IEEE Latin America Transactions.
[20] Yu Cheng,et al. Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks , 2016, IEEE Internet of Things Journal.
[21] Heejo Lee,et al. Botnet Detection by Monitoring Group Activities in DNS Traffic , 2007, 7th IEEE International Conference on Computer and Information Technology (CIT 2007).