Machine Learning Techniques for Network Anomaly Detection: A Survey
暂无分享,去创建一个
Zina Chkirbene | Aiman Erbad | Sohaila Eltanbouly | May Bashendy | Noora AlNaimi | A. Erbad | Zina Chkirbene | May Bashendy | Sohaila Eltanbouly | Noora Alnaimi
[1] Jun Sun,et al. Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning , 2017, 2017 IEEE International Conference on Data Mining Workshops (ICDMW).
[2] Weishi Zhang,et al. An Anomaly Intrusion Detection Method Based on Improved K-Means of Cloud Computing , 2016, 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC).
[3] Elsayed A. Sallam,et al. A hybrid network intrusion detection framework based on random forests and weighted k-means , 2013 .
[4] Xiangjian He,et al. Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.
[5] D. Malathi,et al. A Survey on Anomaly Based Host Intrusion Detection System , 2018 .
[6] Mazen O. Hasna,et al. Location privacy preservation in secure crowdsourcing-based cooperative spectrum sensing , 2016, EURASIP J. Wirel. Commun. Netw..
[7] Aditi Roy,et al. Multi-classification of UNSW-NB15 Dataset for Network Anomaly Detection System , 2020 .
[8] Mohamed Guerroumi,et al. A genetic clustering technique for Anomaly-based Intrusion Detection Systems , 2015, 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).
[9] Victor C. M. Leung,et al. Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment , 2018, Wirel. Commun. Mob. Comput..
[10] Shailendra Sahu,et al. Network intrusion detection system using J48 Decision Tree , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[11] Andreas Kassler,et al. Supervised Machine Learning Techniques for Efficient Network Intrusion Detection , 2019, 2019 28th International Conference on Computer Communication and Networks (ICCCN).
[12] Tim Watson,et al. A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks , 2017, IEEE Access.
[13] Zina Chkirbene,et al. A Combined Decision for Secure Cloud Computing Based on Machine Learning and Past Information , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).
[14] Elena Sitnikova,et al. Collaborative anomaly detection framework for handling big data of cloud computing , 2017, 2017 Military Communications and Information Systems Conference (MilCIS).
[15] Reyadh Shaker Naoum,et al. An Enhanced Resilient Backpropagation Artificial Neural Network for Intrusion Detection System , 2012 .
[16] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[17] Mohammed Samaka,et al. Feasibility of Supervised Machine Learning for Cloud Security , 2016, 2016 International Conference on Information Science and Security (ICISS).
[18] Jill Slay,et al. A hybrid feature selection for network intrusion detection systems: Central points , 2017, ArXiv.
[19] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[20] Yang Lei,et al. Network Anomaly Traffic Detection Algorithm Based on SVM , 2017, 2017 International Conference on Robots & Intelligent System (ICRIS).
[21] Esther Daniel,et al. Survey on Machine Learning and Deep Learning Algorithms used in Internet of Things (IoT) Healthcare , 2019, 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC).
[22] Dewan Md. Farid,et al. Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection , 2010, ArXiv.
[23] Sridhar Adepu,et al. Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks , 2017, 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE).
[24] Ridha Hamila,et al. Important Complexity Reduction of Random Forest in Multi-Classification Problem , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).
[25] Abdul Razaque,et al. Intelligent intrusion detection system using clustered self organized map , 2018, 2018 Fifth International Conference on Software Defined Systems (SDS).
[26] Xiangjian He,et al. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2011, IEEE Transactions on Parallel and Distributed Systems.
[27] Chih-Fong Tsai,et al. A triangle area based nearest neighbors approach to intrusion detection , 2010, Pattern Recognit..
[28] J Anitha,et al. Machine Learning based Image Processing Techniques for Satellite Image Analysis -A Survey , 2019, 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon).
[29] Yongdae Kim,et al. A machine learning framework for network anomaly detection using SVM and GA , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[30] Han Li. Research and Implementation of an Anomaly Detection Model Based on Clustering Analysis , 2010, 2010 International Symposium on Intelligence Information Processing and Trusted Computing.