Computer Science ›› 2020, Vol. 47 ›› Issue (2): 227-232.doi: 10.11896/jsjkx.190600147
• Computer Network • Previous Articles Next Articles
LIU Yun1,2,YIN Chuan-huan1,2,HU Di3,ZHAO Tian3,LIANG Yu3
CLC Number:
[1]PENG X Y,PANG J Y,PENG Y,et al.Overview of anomaly detection of spacecraft telemetry data[J].Chinese Journal of Scientific Instrument,2016,37(9):1929-1945. [2]GAO Y,YANG T,XU M Q,et al.An unsupervised anomaly detection approach for spacecraft based on normal behavior clustering[C]∥2012 Fifth International Conference on Intelligent Computation Technology and Automation.IEEE,2012:478-481. [3]MUNIYANDI A P,RAJESWARI R,RAJARAM R.Network anomaly detection by cascading k-Means clustering and C4.5 decision tree algorithm[J].Procedia Engineering,2012,30:174-182. [4]MÜNZ G,LI S,CARLE G.Traffic anomaly detection using k-means clustering[C]∥GI/ITG Workshop MMBnet.2007:13-14. [5]ERFANI S M,RAJASEGARAR S,KARUNASEKERA S, et al.High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning[J].Pattern Recognition,2016,58:121-134. [6]AMER M,GOLDSTEIN M,ABDENNADHER S.Enhancing one-class support vector machines for unsupervised anomaly detection[C]∥Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description.ACM,2013:8-15. [7]GEORGE A,VIDYAPEETHAM A V.Anomaly detection based on machine learning:dimensionality reduction using PCA and classification using SVM[J].International Journal of Computer Applications,2012,47(21):5-8. [8]MALHOTRA P,VIG L,SHROFF G,et al.Long short term memory networks for anomaly detection in time series[C]∥23rd European Symposium on Artificial Neural Networks,Computational Intelligence and Machine Learning.2015:89. [9]NANDURI A,SHERRY L.Anomaly detection in aircraft data using Recurrent Neural Networks (RNN)[C]∥2016 Integrated Communications Navigation and Surveillance (ICNS).IEEE,2016. [10]SHEIKHAN M,JADIDI Z,FARROKHI A.Intrusion detection using reduced-size RNN based on feature grouping[J].Neural Computing and Applications,2012,21(6):1185-1190. [11]BONTEMPS L,MCDERMOTT J,LE-KHAC N A.Collective anomaly detection based on long short-term memory recurrent neural networks[C]∥International Conference on Future Data and Security Engineering.Cham:Springer,2016:141-152. [12]MALHOTRA P,RAMAKRISHNAN A,ANAND G,et al. LSTM-based encoder-decoder for multi-sensor anomaly detection[J].arXiv:1607.00148,2016. [13]CHENG M,XU Q,LV J,et al.MS-LSTM:A multi-scale LSTM model for BGP anomaly detection[C]∥2016 IEEE 24th International Conference on Network Protocols (ICNP).IEEE,2016:1-6. [14]HUNDMAN K,CONSTANTINOU V,LAPORTE C,et al.Detecting spacecraft anomalies using lstms and nonparametric dynamic thresholding[C]∥Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mi-ning.ACM,2018:387-395. [15]HOCHREITER S,SCHMIDHUBER J.Long short-term memory[J].Neural Computation,1997,9(8):1735-1780. [16]CHANDOLA V,BANERJEE A,KUMAR V.Anomaly detec-tion:A survey[J].ACM computing surveys (CSUR),2009,41(3):15. [17]GOLDSTEIN M,UCHIDA S.A comparative evaluation of unsupervise danomaly detection algorithms for multivariate data[J].PloS One,2016,11(4):e0152173. [18]LI Q,ZHOU X S,LIN P,et al.Anomaly detection and fault diagnosis technology of spacecraft based on telemetry-mining.[C]∥2010 3rd International Symposium on Systems and Control in Aeronautics and Astronautics.IEEE,2010:233-236. [19]ESKIN E,ARNOLD A,PRERAU M,et al.A geometric framework for unsupervised anomaly detection[M]∥Applications of data mining in computer security.Boston:Springer,MA,2002:77-101. [20]LIU F T,TING K M,ZHOU Z H.Isolation-based anomaly detection[J].ACM Transactions on Knowledge Discovery from Data,2012,6(1):1-39. [21]BAY S D,SCHWABACHER M.Mining distance-based outliers in near linear time with randomization and a simple pruning rule[C]∥Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2003:29-38. [22]IVERSON D.Data mining applications for space mission operations system health monitoring[C]∥SpaceOps 2008 Confe-rence.2008:3212. [23]KRIEGEL H P,KRÖGER P,SCHUBERT E,et al.LoOP:local outlier probabilities[C]∥Proceedings of the 18th ACM Confe-rence on Information and Knowledge Management.ACM,2009:1649-1652. [24]PAJOUH H H,JAVIDAN R,KHAYAMI R,et al.A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks[J].IEEE Transactions on Emerging Topics in Computing,2016,7:314-323. [25]DE VRIES T,CHAWLA S,HOULE M E.Finding local anomalies in very high dimensional space[C]∥2010 IEEE InternationalConference on Data Mining.IEEE,2010:128-137. [26]CHO K,VAN MERRIËNBOER B,BAHDANAU D,et al.On the properties of neural machine translation:Encoder-decoder approaches[J].arXiv:1409.1259,2014. [27]DUAN Y,LV Y,WANG F Y.Travel time prediction with LSTM neural network[C]∥2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC).IEEE,2016:1053-1058. |
[1] | ZHANG Yu-shuai, ZHAO Huan, LI Bo. Semantic Slot Filling Based on BERT and BiLSTM [J]. Computer Science, 2021, 48(1): 247-252. |
[2] | LI Yin, LI Bi-xin. Memory Leak Test Acceleration Based on Script Prediction and Reconstruction [J]. Computer Science, 2020, 47(9): 31-39. |
[3] | DING Yu, WEI Hao, PAN Zhi-song, LIU Xin. Survey of Network Representation Learning [J]. Computer Science, 2020, 47(9): 52-59. |
[4] | SU Chang, ZHANG Ding-quan, XIE Xian-zhong, TAN Ya. NFV Memory Resource Management in 5G Communication Network [J]. Computer Science, 2020, 47(9): 246-251. |
[5] | WANG Hui, LE Zi-chun, GONG Xuan, WU Yu-kun, ZUO Hao. Review of Link Prediction Methods Based on Feature Classification [J]. Computer Science, 2020, 47(8): 302-312. |
[6] | YUAN Ye, HE Xiao-ge, ZHU Ding-kun, WANG Fu-lee, XIE Hao-ran, WANG Jun, WEI Ming-qiang, GUO Yan-wen. Survey of Visual Image Saliency Detection [J]. Computer Science, 2020, 47(7): 84-91. |
[7] | PENG Wei, HU Ning and HU Jing-Jing. Overview of Research on Image Steganalysis Algorithms [J]. Computer Science, 2020, 47(6A): 325-331. |
[8] | BAO Zhen-shan, GUO Jun-nan, XIE Yuan and ZHANG Wen-bo. Model for Stock Price Trend Prediction Based on LSTM and GA [J]. Computer Science, 2020, 47(6A): 467-473. |
[9] | ZHU Lin-li, HUA Gang, GAO Wei. Stability Analysis of Ontology Learning Algorithm in Decision Graph Setting [J]. Computer Science, 2020, 47(5): 43-50. |
[10] | JIAN Song-lei, LU Kai. Survey on Representation Learning of Complex Heterogeneous Data [J]. Computer Science, 2020, 47(2): 1-9. |
[11] | LIU Miao-miao,HU Qing-cui,GUO Jing-feng,CHEN Jing. Survey of Link Prediction Algorithms in Signed Networks [J]. Computer Science, 2020, 47(2): 21-30. |
[12] | YANG Li, MA Jia-jia, JIANG Hua-xi, MA Xiao-xiao, LIANG Geng, ZUO Chun. Requirements Modeling and Decision-making for Machine Learning Systems [J]. Computer Science, 2020, 47(12): 42-49. |
[13] | WANG Ying, ZHENG Li-wei, ZHANG Yu-yao, ZHANG Xiao-yun. Software Requirement Mining Method for Chinese APP User Review Data [J]. Computer Science, 2020, 47(12): 56-64. |
[14] | GUO Mao-zu, YANG Shuai, ZHAO Ling-ling. Transcriptome Analysis Method Based on RNA-Seq [J]. Computer Science, 2020, 47(11A): 35-39. |
[15] | JING Li, LI Man-man, HE Ting-ting. Sentiment Classification of Network Reviews Combining Extended Dictionary and Self-supervised Learning [J]. Computer Science, 2020, 47(11A): 78-82. |
|