Intelligent methods for intrusion detection in local area networks
暂无分享,去创建一个
Pantiukhin Dmitry | Voronkov Ilia Mikhailovich | Nazarov Alexey | Pantiukhin Dmitry | Nazarov Alexey
[1] Muhammad Salman Khan,et al. Multiscale Hebbian neural network for cyber threat detection , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[2] J. Friedman. Special Invited Paper-Additive logistic regression: A statistical view of boosting , 2000 .
[3] Hossein Gharaee,et al. A new feature selection IDS based on genetic algorithm and SVM , 2016, 2016 8th International Symposium on Telecommunications (IST).
[4] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[5] SU Yang. Research on Network Behavior Anomaly Analysis Based on Bidirectional LSTM , 2019, 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC).
[6] Kim-Kwang Raymond Choo,et al. Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog , 2019, IEEE Transactions on Information Forensics and Security.
[7] Elias Bou-Harb,et al. Tackling Class Imbalance in Cyber Security Datasets , 2018, 2018 IEEE International Conference on Information Reuse and Integration (IRI).
[8] Songge Xiao,et al. Constructing an Intrusion Detection Model based on Long Short-term Neural Networks , 2018, 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS).
[9] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[10] Jiankun Hu,et al. A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems , 2018, IEEE Access.
[11] S. E. Smaha. Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[12] Jiajun Lin,et al. A Multiple-Layer Representation Learning Model for Network-Based Attack Detection , 2019, IEEE Access.
[13] Iftikhar Ahmad,et al. Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000 , 2018 .
[14] Haibo Liu,et al. A Method for Guaranteeing Wireless Communication Based on a Combination of Deep and Shallow Learning , 2019, IEEE Access.
[15] Zeki Erdem,et al. Network anomaly detection with deep learning , 2018, 2018 26th Signal Processing and Communications Applications Conference (SIU).
[16] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[17] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[18] Slavko Gajin,et al. Ensemble classifiers for supervised anomaly based network intrusion detection , 2017, 2017 13th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP).
[19] Lucas M. Venter,et al. Applying mobile agents in an immune-system-based intrusion detection system , 2005, South Afr. Comput. J..
[20] Kim-Kwang Raymond Choo,et al. An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.
[21] H. Pomares,et al. Statistical analysis of different artificial intelligent techniques applied to Intrusion Detection System , 2012, 2012 International Conference on Multimedia Computing and Systems.
[22] Jill Slay,et al. Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks , 2019, IEEE Transactions on Big Data.
[23] Rasool Jalili,et al. Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks , 2005, ISPEC.
[24] Chongfu Zhang,et al. Developed Density Peak Clustering With Support Vector Data Description for Access Network Intrusion Detection , 2018, IEEE Access.
[25] Ping Wang,et al. Using convolutional neural networks to network intrusion detection for cyber threats , 2018, 2018 IEEE International Conference on Applied System Invention (ICASI).
[26] K. P. Soman,et al. Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.
[27] Billy Peralta,et al. A proposal for mixture of experts with entropic regularization , 2017, 2017 XLIII Latin American Computer Conference (CLEI).
[28] Paul D. Yoo,et al. From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods , 2018, IEEE Communications Surveys & Tutorials.
[29] Andrew H. Sung,et al. Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..
[30] Falko Dressler,et al. FIXIDS: A high-speed signature-based flow intrusion detection system , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.
[31] Tim Watson,et al. A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks , 2017, IEEE Access.
[32] Fan Zhang,et al. An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units , 2018, IEEE Access.
[33] Elena Sitnikova,et al. Collaborative anomaly detection framework for handling big data of cloud computing , 2017, 2017 Military Communications and Information Systems Conference (MilCIS).
[34] Chung-Horng Lung,et al. Hybrid Relabeled Model for Network Intrusion Detection , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[35] Bayu Adhi Tama,et al. Anomaly detection using random forest: A performance revisited , 2017, 2017 International Conference on Data and Software Engineering (ICoDSE).
[36] SEBASTIAN ROSCHKE,et al. High-quality attack graph-based IDS correlation , 2013, Log. J. IGPL.
[37] François Chollet,et al. Keras: The Python Deep Learning library , 2018 .
[38] Andreas Hotho,et al. A Survey of Network-based Intrusion Detection Data Sets , 2019, Comput. Secur..
[39] Dong Jin,et al. A Comparative Study of Off-Line Deep Learning Based Network Intrusion Detection , 2018, 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN).
[40] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[41] Feng Jiang,et al. An Intelligent Network Attack Detection Method Based on RNN , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).
[42] Jill Slay,et al. The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems , 2015, 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).
[43] Jill Slay,et al. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..
[44] Shahrzad Zargari,et al. Feature selection in UNSW-NB15 and KDDCUP'99 datasets , 2017, 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE).
[45] Jeannette M. Wing,et al. Scenario graphs and attack graphs , 2004 .
[46] Jagath Samarabandu,et al. Comparison of Recurrent Neural Network Algorithms for Intrusion Detection Based on Predicting Packet Sequences , 2018, 2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE).
[47] Chung-Horng Lung,et al. Evaluation of machine learning techniques for network intrusion detection , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.
[48] Giovanni Vigna,et al. STATL: An Attack Language for State-Based Intrusion Detection , 2002, J. Comput. Secur..
[49] Harish Kumar,et al. A Reference Dataset for Network Traffic Activity Based Intrusion Detection System , 2015, Int. J. Comput. Commun. Control.
[50] K. P. Soman,et al. Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).