Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 459-463.doi: 10.11896/jsjkx.200600161
• Information Security • Previous Articles Next Articles
CAO Yang-chen1, ZHU Guo-sheng1, QI Xiao-yun2, ZOU Jie1
CLC Number:
[1] ZHOU Z H.Machine learning [M].Beijing:Tsinghua University Press,2016:27,75-84,178-181. [2] GRIFFITHS W,HAJARGASHT G.On GMM estimation ofdistributions from grouped data[J].Economics Letters,2015,126:122-126. [3] HE W H,LI T S,HUANG R W.Intrusion detection model based on Improved BP algorithm in cloud environment [J].Computer Technology and Development,2016,26(2):87-90. [4] WANG M.Network intrusion detection system based on convolutional neural network [D].Beijing:Beijing University of Posts and Telecommunications,2018. [5] HOU C,WANG Y,SHAN H,et al.Application and optimization of stochastic forest algorithm in intrusion detection system [J].Industrial Control Computer,2019,32(6):118-120,122. [6] WANG T,CAI X,NITHYANAND R,et al.Effective attacksand provable defense for website fingerprinting[C]//Proc of the 23rd USENIX Security Symposium.2014:143-157. [7] PANCHENKO A,LANZE F,ZINNEN A,et al.Website fingerprinting at Internet scale[C]//Proc of Network and Distributed Sytem Security Symposium.2016:1-15. [8] GLENNAN T,LECKIEC C,ERFANI M S.Improved classification of known and unknown network traffic flows using semi-supervised machine learning[C]//Proc of Australasian Conference on Information Security and Privacy.2016:493-501. [9] XIE G W,ILIOFOTOUS M,FALOUTSOS M,et al.SubFlow:Towards practical flow-level traffic classification[C]//Proc of International Conference on Communications.2012:2541-2545. [10] CHEN Z Y,YU B W,ZHANG Y,et al.Automatic mobile appliction traffic identification by convolutional neural networks[C]//Proc of IEEE TrustCom/BigDataSE/ISPA.2016:301-307. [11] NGUYEN T T T,ARMITAGE G,BRANCHP,et al.Timelyand continuous machine-learning-based classification for interactive IP traffic[J].IEEE/ACM Transaction on Networking,2012,20(6):1880-1894. [12] WANG Y S,XIA S T.Overview of stochastic forest algorithm in integrated learning [J].Information and Communication Technology,2018,12(1):49-55. [13] FANG K N,WU J B,ZHU J P,et al.Summary of random forest method research [J].Forum of Statistics and Information,2011,26(3):32-38. [14] WEI J T,GAO D M.Research on Intrusion Detection System Based on information gain and random forest classifier [J].Journal of Zhongbei University (Natural Science EditionITION),2018,39(1):74-79,88. [15] ZHU K,ZHANG Q.Application of machine learning in network intrusion detection [J].Data Collection and Processing,2017,32(3):479-488. [16] ZHAO S,CHEN S H.Overview and Prospect of flow recognition technology based on machine learning [J].Computer Engineering and Science,2018,40(10):1746-1756. |
[1] | LENG Dian-dian, DU Peng, CHEN Jian-ting, XIANG Yang. Automated Container Terminal Oriented Travel Time Estimation of AGV [J]. Computer Science, 2022, 49(9): 208-214. |
[2] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
[3] | LI Yao, LI Tao, LI Qi-fan, LIANG Jia-rui, Ibegbu Nnamdi JULIAN, CHEN Jun-jie, GUO Hao. Construction and Multi-feature Fusion Classification Research Based on Multi-scale Sparse Brain Functional Hyper-network [J]. Computer Science, 2022, 49(8): 257-266. |
[4] | WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322. |
[5] | ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen. Study on Malware Classification Based on N-Gram Static Analysis Technology [J]. Computer Science, 2022, 49(8): 336-343. |
[6] | HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11. |
[7] | CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323. |
[8] | GAO Zhen-zhuo, WANG Zhi-hai, LIU Hai-yang. Random Shapelet Forest Algorithm Embedded with Canonical Time Series Features [J]. Computer Science, 2022, 49(7): 40-49. |
[9] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[10] | WANG Wen-qiang, JIA Xing-xing, LI Peng. Adaptive Ensemble Ordering Algorithm [J]. Computer Science, 2022, 49(6A): 242-246. |
[11] | WANG Fei, HUANG Tao, YANG Ye. Study on Machine Learning Algorithms for Life Prediction of IGBT Devices Based on Stacking Multi-model Fusion [J]. Computer Science, 2022, 49(6A): 784-789. |
[12] | QUE Hua-kun, FENG Xiao-feng, LIU Pan-long, GUO Wen-chong, LI Jian, ZENG Wei-liang, FAN Jing-min. Application of Grassberger Entropy Random Forest to Power-stealing Behavior Detection [J]. Computer Science, 2022, 49(6A): 790-794. |
[13] | ZHOU Zhi-hao, CHEN Lei, WU Xiang, QIU Dong-liang, LIANG Guang-sheng, ZENG Fan-qiao. SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm [J]. Computer Science, 2022, 49(6A): 562-570. |
[14] | CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587. |
[15] | LI Ya-ru, ZHANG Yu-lai, WANG Jia-chen. Survey on Bayesian Optimization Methods for Hyper-parameter Tuning [J]. Computer Science, 2022, 49(6A): 86-92. |
|