A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques
暂无分享,去创建一个
[1] EMMANOUIL VASILOMANOLAKIS,et al. Taxonomy and Survey of Collaborative Intrusion Detection , 2015, ACM Comput. Surv..
[2] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .
[3] Guofei Gu,et al. Measuring intrusion detection capability: an information-theoretic approach , 2006, ASIACCS '06.
[4] Mauro Conti,et al. Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features , 2019, Future Gener. Comput. Syst..
[5] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[6] G. Thippa Reddy,et al. FFBAT-Optimized Rule Based Fuzzy Logic Classifier for Diabetes , 2016 .
[7] Nishtha Kesswani,et al. Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT , 2020 .
[8] Vladimir Vapnik,et al. An overview of statistical learning theory , 1999, IEEE Trans. Neural Networks.
[9] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[10] Manuel López Martín,et al. Application of deep reinforcement learning to intrusion detection for supervised problems , 2020, Expert Syst. Appl..
[11] Neelu Khare,et al. An efficient XGBoost–DNN-based classification model for network intrusion detection system , 2020, Neural Computing and Applications.
[12] Jugal K. Kalita,et al. Network attacks: Taxonomy, tools and systems , 2014, J. Netw. Comput. Appl..
[13] Thomas G. Dietterich. Overfitting and undercomputing in machine learning , 1995, CSUR.
[14] Jill Slay,et al. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..
[15] Mohiuddin Ahmed,et al. A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..
[16] Ejaz Ahmed,et al. Real-time big data processing for anomaly detection: A Survey , 2019, Int. J. Inf. Manag..
[17] Honghai Liu,et al. Research on gesture recognition of smart data fusion features in the IoT , 2019, Neural Computing and Applications.
[18] Kim-Kwang Raymond Choo,et al. An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.
[19] Shahram Babaie,et al. A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection , 2018, Comput. Networks.
[20] David A. Landgrebe,et al. A survey of decision tree classifier methodology , 1991, IEEE Trans. Syst. Man Cybern..
[21] Farrukh Aslam Khan,et al. TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection , 2019, IEEE Access.
[22] Zheng Wang,et al. Deep Learning-Based Intrusion Detection With Adversaries , 2018, IEEE Access.
[23] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[24] Andreas Hotho,et al. A Survey of Network-based Intrusion Detection Data Sets , 2019, Comput. Secur..
[25] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[26] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[27] Neelu Khare,et al. An Efficient System for Heart Disease Prediction Using Hybrid OFBAT with Rule-Based Fuzzy Logic Model , 2017, J. Circuits Syst. Comput..
[28] Elena Sitnikova,et al. A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework , 2020, Future Gener. Comput. Syst..
[29] Quanyan Zhu,et al. Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[30] Celestine Iwendi,et al. The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems , 2020, Sensors.
[31] Oscar Castillo,et al. Special issue on “Extensions to type-1 fuzzy logic: theory, algorithms and applications” , 2020, Soft Comput..
[32] Xiangjian He,et al. Enhancing Big Data Security with Collaborative Intrusion Detection , 2014, IEEE Cloud Computing.
[33] Harshita Patel,et al. A review on classification of imbalanced data for wireless sensor networks , 2020, Int. J. Distributed Sens. Networks.
[34] Penghong Wang,et al. Weight convergence analysis of DV-hop localization algorithm with GA , 2020, Soft Comput..
[35] Bayu Adhi Tama,et al. TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System , 2019, IEEE Access.
[36] Ying Gao,et al. A Distributed Network Intrusion Detection System for Distributed Denial of Service Attacks in Vehicular Ad Hoc Network , 2019, IEEE Access.
[37] Elena Sitnikova,et al. Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..
[38] Georgios Kambourakis,et al. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.
[39] Gautam Srivastava,et al. KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks , 2020, IEEE Access.
[40] Kangfeng Zheng,et al. Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network , 2019, Sensors.
[41] Keith Phalp,et al. Exploring discrepancies in findings obtained with the KDD Cup '99 data set , 2011, Intell. Data Anal..