Unsupervised Scanning Behavior Detection Based on Distribution of Network Traffic Features Using Robust Autoencoders
暂无分享,去创建一个
[1] Max Mühlhäuser,et al. ID2T: A DIY dataset creation toolkit for Intrusion Detection Systems , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[2] Parvez Ahammad,et al. SoK: Applying Machine Learning in Security - A Survey , 2016, ArXiv.
[3] Sanjiv Kumar,et al. On the Convergence of Adam and Beyond , 2018 .
[4] George Bebis,et al. A survey of network flow applications , 2013, J. Netw. Comput. Appl..
[5] R Hecht-Nielsen,et al. Replicator neural networks for universal optimal source coding. , 1995, Science.
[6] Randy C. Paffenroth,et al. Anomaly Detection with Robust Deep Autoencoders , 2017, KDD.
[7] Dong Yu,et al. Deep Learning: Methods and Applications , 2014, Found. Trends Signal Process..
[8] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[9] Mohiuddin Ahmed,et al. A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..
[10] Max Mühlhäuser,et al. Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[11] Geoffrey E. Hinton,et al. Layer Normalization , 2016, ArXiv.
[12] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[13] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[14] Jürgen Quittek,et al. Requirements for IP Flow Information Export (IPFIX) , 2004, RFC.