Computer Science ›› 2022, Vol. 49 ›› Issue (10): 353-357.doi: 10.11896/jsjkx.220700095
• Information Security • Previous Articles
WANG Lu1, WEN Wu-song2
CLC Number:
[1]ALLADI T,KOHLI V,CHAMOLA V,et al.Artificial Intelligence(AI)-Empowered Intrusion Detection Architecture for the Internet of Vehicles[J].IEEE Wireless Communications,2021,28(3):144-149. [2]ZEBIN T,REZVY S,LUO Y,An Explainable AI-Based Intrusion Detection System for DNS Over HTTPS(DoH) Attacks[J].IEEE Transactions on Information Forensics and Security,2022,17:2339-2349. [3]CHEN X A.Research on the intrusion detection system of computer network[J].Electronic Test,2021(18):76-77,73. [4]ZHONG W,YU N C.Applying big data based deep learning system to intrusion detection[J].Big Data Mining and Analy-tics,2020,3(3):181-195. [5]LU L,SUN Y E,HUANG H,et al.Detection of persistent elements in distributed monitoring system[J].Journal of Computer Research and Development,2020,57(5):1046-1056. [6]TANJ A,GUAN J F.Distributed intrusion detection system of networks based on artificial bee colony algorithm[J].Computer Applications and Software,2019,36(3):326-333. [7]CHENG W Z,ZHANG L.Talking about distributed intrusion detection system[J].Sci-Tech & Development of Enterprise,2018(7):93-94. [8]HONG B,CAO Z J.Design and implement of distributed intrusion detection system based on Hadoop[J].Journal of Xi'an Technological University,2018,38(4):390-395,407. [9]WANG X Y.Design of temporal sequence association rule based intrusion detection behavior detection system for distributed network[J].Modern Electronics Technique,2018,41(3):107-110. [10]LI H.Research on hybrid architecture for distributed intrusion detection system in wireless network[J].Techniques of Automation and Applications,2018,37(5):52-55,60. [11]CHOI I,LEE J,KWON T,et al.An Easy-to-use Framework to Build and Operate AI-based Intrusion Detection for In-situ Monitoring[C]//2021 16th Asia Joint Conference on Information Security(AsiaJCIS).2021:1-8. [12]ALI M,HU Y F,LUONG D K,et al.Adversarial Attacks on AI based Intrusion Detection System for Heterogeneous Wireless Communications Networks[C]//2020 AIAA/IEEE 39th Digital Avionics Systems Conference(DASC).2020:1-6. [13]LI X.Research and implementation of intrusion detection system based on spark [D].Taiyuan:Shanxi University,2021. [14]ZHANG S S.Design and implementation of security intrusion detection system based on software definition [D].Hangzhou:Zhejiang University,2020. [15]HU B.Distributed vulnerability emergency detection system[D].Chengdu:University of Electronic Science and Technology,2020. [16]GAO Y,LIU Y,JIN Y,et al.A Novel Semi-Supervised Learning Approach for Network Intrusion Detection on Cloud-Based Robotic System[J].IEEE Access,2018,6:50927-50938. [17]ZHANG W X.Design and implementation of intrusion detection system based on improved cann algorithm [D].Xi'an:Xi'an University of Electronic Science and Technology,2019. [18]LI J,ZHAO Z,LI R,et al.AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks[J].IEEE Internet of Things Journal,2019,6(2):2093-2102. [19]HE J P,LUO L,XIAO K,et al.Framework intrusion detection system based on feature distribution and AI[J].Application Research of Computers,2021,38(9):2746-2751. |
[1] | LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193. |
[2] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[3] | YANG Ya-hong, WANG Hai-rui. DDoS Attack Detection Method in SDN Environment Based on Renyi Entropy and BiGRU Algorithm [J]. Computer Science, 2022, 49(6A): 555-561. |
[4] | ZHANG Zhi-long, SHI Xian-jun, QIN Yu-feng. Diagnosis Strategy Optimization Method Based on Improved Quasi Depth Algorithm [J]. Computer Science, 2022, 49(6A): 729-732. |
[5] | WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355. |
[6] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[7] | LI Ye, CHEN Song-can. Physics-informed Neural Networks:Recent Advances and Prospects [J]. Computer Science, 2022, 49(4): 254-262. |
[8] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[9] | DU Hui, LI Zhuo, CHEN Xin. Incentive Mechanism for Hierarchical Federated Learning Based on Online Double Auction [J]. Computer Science, 2022, 49(3): 23-30. |
[10] | TAN Shuang-jie, LIN Bao-jun, LIU Ying-chun, ZHAO Shuai. Load Scheduling Algorithm for Distributed On-board RTs System Based on Machine Learning [J]. Computer Science, 2022, 49(2): 336-341. |
[11] | LI Ming-liang, PANG Jian-min, YUE Feng. Distributed Lock with Inter-core Passing for SW26010 Processor [J]. Computer Science, 2022, 49(10): 52-58. |
[12] | ZHANG Fu-chang, ZHONG Guo-qiang, MAO Yu-xu. Neural Architecture Search for Light-weight Medical Image Segmentation Network [J]. Computer Science, 2022, 49(10): 183-190. |
[13] | LIU Ming-da, SHI Yi-juan, RAO Xiang, FAN Lei. Distributed Privacy Protection Data Search Scheme [J]. Computer Science, 2022, 49(10): 291-296. |
[14] | WANG Ru-bin, LI Rui-yuan, HE Hua-jun, LIU Tong, LI Tian-rui. Distributed Distance Join Algorithm for Massive Spatial Data [J]. Computer Science, 2022, 49(1): 95-100. |
[15] | CHAO Le-men, YIN Xian-long. AI Governance and System:Current Situation and Trend [J]. Computer Science, 2021, 48(9): 1-8. |
|