Computer Science ›› 2023, Vol. 50 ›› Issue (11A): 230300142-8.doi: 10.11896/jsjkx.230300142
• Information Security • Previous Articles Next Articles
BAI Wanrong1, WEI Feng1, ZHENG Guangyuan2, WANG Baohui2
CLC Number:
[1]NIKOLOVA E,JECHEVA V.Some similarity coefficients andapplication of data mining techniques to the anomalybased IDS[J].Telecommunication Systems,2012,50(2):127-135. [2]ALAZAB A,ABAWAJY J,HOBBS M,et al.Crime toolkits:the productisation of cybercrime[C]// IEEE.IEEE,2013:1626-1632. [3]XIAO L,CHEN Y,CHANG C K.Bayesian Model Averaging of Bayesian Network Classifiers for Intrusion Detection[C]//Computer Software & Applications Conference Workshops.IEEE,2014. [4]JING X Y,BI Y,DENG H.An innovative two-stage fuzzykNN-DST classifier for unknown intrusion detection[J].International Arab Journal of Information Technology,2016,13(4):359-366. [5]OHKI T,GUPTA V,NISHIGAKI M.Efficient Spoofing Attack Detection against Unknown Sample using End-to-End Anomaly Detection[C]//Asia-Pacific Signal and Information Processing Association Annual Summit and Conference(APSIPA ASC).2019. [6]ALSAADI H I,ALMUTTAIRIR M,BAYAT O,et al.Computational Intelligence Algorithms to Handle Dimensionality Reduction for Enhancing Intrusion Detection System [J].Journal of Information Science andEngineering 2020,36:293-308. [7]TANG C F,BULI N,AI Z.Research on networkintrusion detection based on LightGBM[J].Computer Applications and Software,2022,39(8):298-311. [8]YU Y,LIU G,YAN H,et al.Attention-based BiLSTM modelfor anoma- lous HTTP traffic detection[C]//15th International Conference on Service Systems and Service Management.2018:1-6. [9]TAN M,IACOVAZZI A,CHEUNG N M M,et al.A neural attention model for real-time network intrusion detection[C]//2019 IEEE 44th Conference on Local Computer Networks.2019:291-299. [10]AHSAN M,NYGARD K E.Convolutional neural networkswith LSTM for intrusion detection[C]// Proceeding of 35th International Conference on Computers and Their Applications.2020:69-79. [11]GURUNG S,GHOSE M K,SUBEDI A.Deep learning approach on network intrusion detection system using NSL-KDD dataset[J].International Journal of Computer Network and Information Security,2019,11(3):8-14. [12]HSU C M,HSIEH H Y,PRAKOSA S W,et al.Using longshort term memory based convolutional neural networks for network intrusion detection[C]//International Wireless Internet Conference.2018:86-94. [13]GHAEMI M,FEIZI-DERAKHSHI M R.Forest optimization algorithm[J].Expert Systems with Applications,2014,41(15):6676-6687. [14]CHU B,LI Z S,ZHANG M L,et al.Research onImprovements ofFeature Selection Using Forest Optimization Algorithm[J].Journal of Software,2018,29(9):2545-2558. [15]BAI S,KOLTER J Z,KOLTUN V.An empirical evaluation of generic convolutionalandrecurrent networks for sequence mode-ling[J].arXiv:1803.01271,2018. |
[1] | YANG Pengfei, CAI Ruijie, GUO Shichen, LIU Shengli. Container-based Intrusion Detection Method for Cisco IOS-XE [J]. Computer Science, 2023, 50(4): 298-307. |
[2] | LI Haitao, WANG Ruimin, DONG Weiyu, JIANG Liehui. Semi-supervised Network Traffic Anomaly Detection Method Based on GRU [J]. Computer Science, 2023, 50(3): 380-390. |
[3] | WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322. |
[4] | ZHOU Zhi-hao, CHEN Lei, WU Xiang, QIU Dong-liang, LIANG Guang-sheng, ZENG Fan-qiao. SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm [J]. Computer Science, 2022, 49(6A): 562-570. |
[5] | CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587. |
[6] | WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355. |
[7] | PAN Zhi-hao, ZENG Bi, LIAO Wen-xiong, WEI Peng-fei, WEN Song. Interactive Attention Graph Convolutional Networks for Aspect-based Sentiment Classification [J]. Computer Science, 2022, 49(3): 294-300. |
[8] | WANG Jue, LU Bin, ZHU Yue-fei. Generation and Application of Adversarial Network Traffic:A Survey [J]. Computer Science, 2022, 49(11A): 211000039-11. |
[9] | SONG Mei-qi, FU Xiang-ling, YAN Chen-wei, WU Wei-qiang, REN Yun. Prediction Model of Enterprise Resilience Based on Bi-directional Long Short-term Memory Network [J]. Computer Science, 2022, 49(11): 197-205. |
[10] | WANG Lu, WEN Wu-song. Study on Distributed Intrusion Detection System Based on Artificial Intelligence [J]. Computer Science, 2022, 49(10): 353-357. |
[11] | ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351. |
[12] | LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54. |
[13] | CHENG Xi, CAO Xiao-mei. SQL Injection Attack Detection Method Based on Information Carrying [J]. Computer Science, 2021, 48(7): 70-76. |
[14] | CAO Yang-chen, ZHU Guo-sheng, QI Xiao-yun, ZOU Jie. Research on Intrusion Detection Classification Based on Random Forest [J]. Computer Science, 2021, 48(6A): 459-463. |
[15] | YU Jian-ye, QI Yong, WANG Bao-zhuo. Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark [J]. Computer Science, 2021, 48(6A): 518-523. |
|