Computer Science ›› 2021, Vol. 48 ›› Issue (2): 324-329.doi: 10.11896/jsjkx.200800030
Special Issue: Internet of Things
• Information Security • Previous Articles Next Articles
LIU Xin, HUANG Yuan-yuan, LIU Zi-ang, ZHOU Rui
CLC Number:
[1] ALFONSO V,JAMES F H,HUNG L H,et al.Predicts 2015:The Internet of Things[EB/OL].(2014-12-30) [2020-07-28].https:∥www.gartner.com/doc/2952822/predicts-internet-things. [2] ALAN N,ALEX S,Internet security threat report[EB/OL].(2019-02) [2020-07-28].https:∥symantec.broadcom.com/symc-istr-v24-2019-6819. [3] WAKEFIELDR L.Computer monitoring and surveillance[J].The CPA Journal,2004,74(7):52. [4] DENNING D E.An Intrusion-Detection Model[J].IEEE Transactions on Software Engineering,1987,SE-13(2):222-232. [5] YU F,CHEN Z F,DIAO Y L,et al.Fast and memory-efficient regular expression matching for deep packet inspection[C]//2006 ACM/IEEE symposium on Architecture for networking and communications systems (ANCS'06).2006:93-102. [6] ROESCH M.Snort - Lightweight Intrusion Detection for Networks[C]// In Proceedings of the 13th USENIX conference on System administration (LISA '99).Association,USA,1999:229-238. [7] KRUEGEL C,TOTH T.Using Decision Trees to Improve Signature-Based Intrusion Detection[C]//Recent Advances in Intrusion Detection(RAID 2003).Lecture Notes in Computer Science,2003:173-191. [8] CHEN W H,HSU S H,SHEN H P.Application of SVM and ANN for intrusion detection[J].Computers & Operations Research,2005,32(10):2617-2634. [9] LIANG J,ZHAO W,YE W.Anomaly-Based Web Attack Detection:A Deep Learning Approach[C]//The 2017 VI International Conference on Network,Communication and Computing (ICNCC 2017).2017:80-85. [10] SAXE J,BERLIN K.Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features[C]// 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).Fajardo,2015:11-20. [11] TIAN Z,LUO C,QIU J,et al.A Distributed Deep Learning System for Web Attack Detection on Edge Devices[J].IEEE Transactions on Industrial Informatics,2020,16(3):1963-1971. [12] TAMA B A,NKENYEREYE L,ISLAM S M R,et al.An Enhanced Anomaly Detection in Web Traffic Using a Stack of Classifier Ensemble[J].IEEE Access,2020,8:24120-24134. [13] MOHAMMADI S,NAMADCHIAN A.Anomaly-based WebAttack Detection:The Application of Deep Neural Network Seq2Seq With Attention Mechanism[J].The ISC International Journal of Information Security,2020,12(1):44-54. [14] DU M,LI F,ZHENG G,et al.DeepLog:Anomaly Detection and Diagnosis from System Logs through Deep Learning[C]// The 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS'17).2017:1285-1298. [15] JIANG F,FU Y,GUPTAB B,et al.Deep Learning based Multi-channel intelligent attack detection for Data Security[J].IEEE Transactions on Sustainable Computing,2020,5(2):204-212. [16] JIN X,CUI B,YANG J,et al.Payload-Based Web Attack Detection Using Deep Neural Network[C]//Advances on Broad-Band Wireless Computing,Communication and Applications(BWCCA 2017).Lecture Notes on Data Engineering and Communications Technologies,2018:482-488. [17] SKARUZ J,SEREDYNSKI F.Recurrent neural networks towards detection of SQL attacks[C]//2007 IEEE International Parallel and Distributed Processing Symposium.Rome,2007:1-8. [18] LIU H Y,LANG B,LIU M,et al.CNN and RNN based payload classification methods for attack detection[J].Knowledge-Based Systems,2019,163(1):332-341. [19] LI Z,ZOU D,XU S,et al.VulDeePecker:A Deep Learning-Based System for Vulnerability Detection[C]// Network and Distributed System Security Symposium.2018:23158. [20] HOCHREITER S,SCHMIDHUBER J.Long Short-Term Me-mory[J].Neural Computation,1997,9(8):1735-1780. [21] YONG B,LIU X,YU Q,et al.Malicious Web traffic detection for Internet of Things environments[J].Computers & Electrical Engineering,2019,77:260-272. |
[1] | SUN Hui-ting, FAN Yan-fang, MA Meng-xiao, CHEN Ruo-yu, CAI Ying. Dynamic Pricing-based Vehicle Collaborative Computation Offloading Scheme in VEC [J]. Computer Science, 2022, 49(9): 242-248. |
[2] | YU Bin, LI Xue-hua, PAN Chun-yu, LI Na. Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning [J]. Computer Science, 2022, 49(7): 248-253. |
[3] | ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270. |
[4] | LI Meng-fei, MAO Ying-chi, TU Zi-jian, WANG Xuan, XU Shu-fang. Server-reliability Task Offloading Strategy Based on Deep Deterministic Policy Gradient [J]. Computer Science, 2022, 49(7): 271-279. |
[5] | YUAN Hao-nan, WANG Rui-jin, ZHENG Bo-wen, WU Bang-yan. Design and Implementation of Cross-chain Trusted EMR Sharing System Based on Fabric [J]. Computer Science, 2022, 49(6A): 490-495. |
[6] | FANG Tao, YANG Yang, CHEN Jia-xin. Optimization of Offloading Decisions in D2D-assisted MEC Networks [J]. Computer Science, 2022, 49(6A): 601-605. |
[7] | LIU Zhang-hui, ZHENG Hong-qiang, ZHANG Jian-shan, CHEN Zhe-yi. Computation Offloading and Deployment Optimization in Multi-UAV-Enabled Mobile Edge Computing Systems [J]. Computer Science, 2022, 49(6A): 619-627. |
[8] | ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743. |
[9] | XIE Wan-cheng, LI Bin, DAI Yue-yue. PPO Based Task Offloading Scheme in Aerial Reconfigurable Intelligent Surface-assisted Edge Computing [J]. Computer Science, 2022, 49(6): 3-11. |
[10] | DONG Dan-dan, SONG Kang. Performance Analysis on Reconfigurable Intelligent Surface Aided Two-way Internet of Things Communication System [J]. Computer Science, 2022, 49(6): 19-24. |
[11] | Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54. |
[12] | ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun. New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [J]. Computer Science, 2022, 49(3): 329-337. |
[13] | ZHANG Hai-bo, ZHANG Yi-feng, LIU Kai-jian. Task Offloading,Migration and Caching Strategy in Internet of Vehicles Based on NOMA-MEC [J]. Computer Science, 2022, 49(2): 304-311. |
[14] | LIN Chao-wei, LIN Bing, CHEN Xing. Study on Scientific Workflow Scheduling Based on Fuzzy Theory Under Edge Environment [J]. Computer Science, 2022, 49(2): 312-320. |
[15] | LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54. |
|