A survey of deep learning-based network anomaly detection
暂无分享,去创建一个
Jinoh Kim | Sang C. Suh | Hyunjoo Kim | Kuinam J. Kim | Donghwoon Kwon | Ikkyun Kim | S. Suh | Jinoh Kim | Kuinam J. Kim | Ikkyun Kim | Donghwoon Kwon | Hyunjoo Kim
[1] Tarek M. Taha,et al. Intrusion Detection Using Deep Belief Network and Extreme Learning Machine , 2015, Int. J. Monit. Surveillance Technol. Res..
[2] Debajyoti Mukhopadhyay,et al. A Survey of Classification Techniques in the Area of Big Data , 2015, ArXiv.
[3] Hiroshi Motoda,et al. Feature Selection Extraction and Construction , 2002 .
[4] Wei Yi,et al. A Big Network Traffic Data Fusion Approach Based on Fisher and Deep Auto-Encoder , 2016 .
[5] Pradeep Kumar Mallick,et al. Research Advances in the Integration of Big Data and Smart Computing , 2015 .
[6] Heba F. Eid,et al. Hybrid Intelligent Intrusion Detection Scheme , 2011 .
[7] Dong Yu,et al. Deep Learning: Methods and Applications , 2014, Found. Trends Signal Process..
[8] M Namratha,et al. A Comprehensive Overview of Clustering Algorithms in Pattern Recognition , 2012 .
[9] Anil K. Jain. Data clustering: 50 years beyond K-means , 2008, Pattern Recognit. Lett..
[10] Shilpa Lakhina,et al. Performance Comparison of Features Reduction Techniques for Intrusion Detection System , 2012 .
[11] Hemanta Kumar Kalita,et al. Advanced Dimensionality Reduction Method for Big Data , 2016 .
[12] Christian Igel,et al. Training restricted Boltzmann machines: An introduction , 2014, Pattern Recognit..
[13] Howon Kim,et al. Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).
[14] William W. Cohen,et al. Semi-Supervised Classification of Network Data Using Very Few Labels , 2010, 2010 International Conference on Advances in Social Networks Analysis and Mining.
[15] Emile H. L. Aarts,et al. Boltzmann machines , 1998 .
[16] Kunle Olukotun,et al. A Large-Scale Architecture for Restricted Boltzmann Machines , 2010, 2010 18th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines.
[17] Shailesh Singh Panwar,et al. DATA REDUCTION TECHNIQUES TO ANALYZE NSL-KDD DATASET , 2014 .
[18] Yong Wang,et al. A Big Network Traffic Data Fusion Approach Based on Fisher and Deep Auto-Encoder , 2016, Inf..
[19] Taghi M. Khoshgoftaar,et al. Deep learning applications and challenges in big data analytics , 2015, Journal of Big Data.
[20] Abdelfatah M. Mohamed,et al. IDS in Telecommunication Network Using PCA , 2013, ArXiv.
[21] Je-Won Kang,et al. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security , 2016, PloS one.
[22] Alpa Reshamwala,et al. A Review of Intrusion Detection System Using Neural Network and Machine Learning Technique , 2012 .
[23] Geoffrey E. Hinton,et al. Reducing the Dimensionality of Data with Neural Networks , 2006, Science.
[24] Georg Langs,et al. Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery , 2017, IPMI.
[25] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[26] Md Zahangir Alom,et al. Intrusion detection using deep belief networks , 2015, 2015 National Aerospace and Electronics Conference (NAECON).
[27] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[28] Najla B. Ibraheem,et al. Principle Components Analysis and Multi Layer Perceptron Based Intrusion Detection System , 2013 .
[29] Vivienne Sze,et al. Efficient Processing of Deep Neural Networks: A Tutorial and Survey , 2017, Proceedings of the IEEE.
[30] Aijaz Ahmed,et al. Signature-based Network Intrusion Detection System using JESS (SNIDJ) , 2005, EuroIMSA.
[31] Geoffrey E. Hinton. A Practical Guide to Training Restricted Boltzmann Machines , 2012, Neural Networks: Tricks of the Trade.
[32] Hironobu Fujiyoshi,et al. To Be Bernoulli or to Be Gaussian, for a Restricted Boltzmann Machine , 2014, 2014 22nd International Conference on Pattern Recognition.
[33] Amita Arora,et al. Dimension Reduction in Intrusion Detection Features Using Discriminative Machine Learning Approach , 2013 .
[34] Jinoh Kim,et al. Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).
[35] Tao Xu,et al. SegAN: Adversarial Network with Multi-scale L1 Loss for Medical Image Segmentation , 2017, Neuroinformatics.
[36] Mounir Ghogho,et al. Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).
[37] Sushil Jajodia,et al. Intrusion Detection Techniques , 2004 .
[38] Pat Langley,et al. Static Versus Dynamic Sampling for Data Mining , 1996, KDD.
[39] Hee-su Chae,et al. Feature Selection for Intrusion Detection using NSL-KDD , 2013 .
[40] Malcolm I. Heywood,et al. Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 , 2005, PST.
[41] Yuancheng Li,et al. A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .
[42] Rich Caruana,et al. An empirical comparison of supervised learning algorithms , 2006, ICML.
[43] A. Malathi,et al. A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection , 2013 .