Computer Science ›› 2018, Vol. 45 ›› Issue (11): 164-168.doi: 10.11896/j.issn.1002-137X.2018.11.025
• Information Security • Previous Articles Next Articles
XING Rui-kang, LI Cheng-hai, FAN Xiao-shi
CLC Number:
[1]李为民,黄仁全,王春阳,等.防空体系反制网电攻击概论.北京:解放军出版社,2013. [2]PEDRO M P,PEDRO C,HUMBERTO B,et al.Image segmentation using Atanassov’s intuitionistic fuzzy sets .Expert Systems with Applications,2013,4(1):15-26. [3]CHANDOLA V,BANERJEE A,KUMAR V.Anomaly Detection:A Survey.ACM Computing Surveys,2009,41(3):1-58. [4]CHEN Y H,MA X L,WU X Y.DDoS Detection Algorithm Based on Preprocessing Network Traffic Predicted Method and Chaos Theory.IEEE Communications letters,2013,17(5):1052-1054. [5]TAN Z Y,JAMDAGNI A,HE X J,et al.A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis .IEEE Transactions on Parallel and Distributed Systems,2013,25(2):447-456. [6]LI H Z,GUO S,LI C J,et al.A hybrid annual power load forecasting model based on generalized regression neural network with fruit fly optimization algorithm .Knowledge Based Systems,2013,37(2):378-387. [7]THANASIS V,ALEXANDROS P,CHRISTOS I,et al.Real-time Network Data Analysis Using Time Series Models.Simulation Modelling Practice and Theory,2012,29(29):173-180. [8]MENG F Y,CHEN X H.Entropy and similarity measure of Atanassov’s intuitionistic fuzzy sets and their application to pattern recognition based on fuzzy measures .Pattern Analysis &Applications,2016,19(1):11-20. [9]LIPPMANN R P,INGOLS K W,SCOTT C,et al.Evaluating and Strengthening Enterprise Network Security Using Attack Graphs:ESC-TR-2005-064.MIT Lincoln Laboratory,2005. [10]HUANG X W,ZHANG C.Techniques for intrusion detection based on adaptive intuitionistic fuzzy reasoning.Journal of Computer Applications,2010,30(5):1198-1201.(in Chinese) 黄孝文,张弛.基于自适应直觉模糊推理的入侵检测方法[J].计算机应用,2010,30(5):1198-1201. [11]AHMAD I,ABDULLAH A,ALGHAMDI A,et al.Optimized Intrusion Detection Mechanism using Soft Computing Techniques.Telecommunication Systems,2013,52(4):2187-2195. [12]LENG G,MCG I,PRASAD G.Design for self organizing fuzzy neural networks based on genetic algorithms .IEEE Transa-ctions on Fuzzy Systems,2006,14(6):755-766. [13]TARTAKOVSKY A G,POLUNCHENKO A S,SOKOLOV G.Efficient Computer Network Anomaly Detection by Changepoint Detection Methods .IEEE Journal of Selected Topics in Signal Processing,2013,7(1):4-11. [14]YANG Y H,HUANG H Z,SHEN Q N,et al.Reserch on intrusion detection based on Incremental GHSOM.Chinese Journal of Computers,2014,37(5):1217-1224.(in Chinese) 杨雅辉,黄海珍,沈晴霓,等.基于增量式GHSOM神经网络模型的入侵检测研究.计算机学报,2014,37(5):1217-1224. [15]FU M B.A Intrusion Detection System Based on Cluster Analysis.Software Engineering,2016,19(4):10-12.(in Chinese) 付明柏.一种基于聚类分析的入侵检测模型.软件工程,2016,19(4):10-12. [16]LI J,DENG G,LI H,et al.The relationship between similarity measure and entropy of intuitionistic fuzzy sets.Information Sciences,2012,188(1):314-321. [17]ASKARI S,MONTAZERIN N.A high-order multi-variable Fuzzy Time Series forecasting algorithm based on fuzzy clustering.Expert Systems with Applications,2015,42(9):2121-2135. |
[1] | WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322. |
[2] | ZHOU Zhi-hao, CHEN Lei, WU Xiang, QIU Dong-liang, LIANG Guang-sheng, ZENG Fan-qiao. SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm [J]. Computer Science, 2022, 49(6A): 562-570. |
[3] | CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587. |
[4] | WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355. |
[5] | ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351. |
[6] | LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54. |
[7] | CHENG Xi, CAO Xiao-mei. SQL Injection Attack Detection Method Based on Information Carrying [J]. Computer Science, 2021, 48(7): 70-76. |
[8] | DAI Zong-ming, HU Kai, XIE Jie, GUO Ya. Ensemble Learning Algorithm Based on Intuitionistic Fuzzy Sets [J]. Computer Science, 2021, 48(6A): 270-274. |
[9] | CAO Yang-chen, ZHU Guo-sheng, QI Xiao-yun, ZOU Jie. Research on Intrusion Detection Classification Based on Random Forest [J]. Computer Science, 2021, 48(6A): 459-463. |
[10] | YU Jian-ye, QI Yong, WANG Bao-zhuo. Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark [J]. Computer Science, 2021, 48(6A): 518-523. |
[11] | JIA Lin, YANG Chao, SONG Ling-ling, CHENG Zhenand LI Bei-jun. Improved Negative Selection Algorithm and Its Application in Intrusion Detection [J]. Computer Science, 2021, 48(6): 324-331. |
[12] | WANG Ying-ying, CHANG Jun, WU Hao, ZHOU Xiang, PENG Yu. Intrusion Detection Method Based on WiFi-CSI [J]. Computer Science, 2021, 48(6): 343-348. |
[13] | LIU Quan-ming, LI Yin-nan, GUO Ting, LI Yan-wei. Intrusion Detection Method Based on Borderline-SMOTE and Double Attention [J]. Computer Science, 2021, 48(3): 327-332. |
[14] | KANG Bo, PAN Xiao-dong, WANG Hu. Fuzzy Reasoning Method Based on Axiomatic Fuzzy Sets [J]. Computer Science, 2021, 48(11A): 57-62. |
[15] | ZHU Rong-chen, LI Xin, WANG Han-xu, YE Han, CAO Zhi-wei, FAN Zhi-jie. Camera Identity Recognition Method Fused with Multi-dimensional Identification Features [J]. Computer Science, 2021, 48(11A): 565-569. |
|