A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection
Tóm tắt
Từ khóa
Tài liệu tham khảo
2008, Estonia Fines Man for ‘Cyber War’
Dignan, 2008, Amazon Exploits Its S3 Outage
Dekker, 2013, Cloud security incident reporting: Framework for reporting about major cloud security incidents
2014, Ello Social Network Hit by Suspected Bloody DDoS Attack
2014, Cisco Anual Report
2017, Cisco annual cyber security report
2017, Snort 2.9.7.6
2018, Suricata 4.0.4
Lunt, Ides: An intelligent system for detecting intruders, Proc. Symp. Comput. Security Threat Countermeasures, 30
Ertöz, 2004, MINDS-minnesota intrusion detection system, Next Generation Data Mining, 199
1999, KDD Cup 1999 Data
Quinlan, 1993, C4.5: Programs for Machine Learning
Kumar, 2007, Survey of Current Network Intrusion Detection Techniques, 1
Zhang, 2003, Intrusion detection techniques for mobile wireless networks, Wireless Netw., 9, 545, 10.1023/A:1024600519144
Halilovic, 2012, Intrusion detection on smartphones, arXiv e-print 1211.6610, 1
Sikder, 6thSense: A context-aware sensor-based attack detector for smart devices, Proc. 26th USENIX Security Symp., 397
Haq, 2015, Application of machine learning approaches in intrusion detection system: A survey, Int. J. Adv. Res. Artif. Intell., 4, 9
Crenshaw, 2008, OSfuscate: Change Your Windows OS TCP/IP Fingerprint to Confuse P0f, NetworkMiner, Ettercap, Nmap and Other OS Detection Tools
Norton, 2004, An Ettercap Primer
Guillén, Detection of non-content based attacks using GA with extended KDD features, Proc. World Congr. Eng. Comput. Sci., 30
1999, Darpa Intrusion Detection Attacks Database
Singh, 2009, A survey of cyber attack detection systems, Int. J. Comput. Sci. Netw. Security, 9, 1
Sabhnani, KDD feature set complaint heuristic rules for R2L attack detection, Proc. Security Manag., 310
Quinlan, 1993, C4.5: Programs for Machine Learning
Mitchell, 1997, Machine Learning
Moya, 1993, One-class classifier networks for target recognition applications
Bivens, 2002, Network-based intrusion detection using neural networks, Intell. Eng. Syst. Artif. Neural Netw., 12, 579
John, Estimating continuous distributions in Bayesian classifiers, Proc. 11th Conf. Uncertainty Artif. Intell., 338
McCallum, A comparison of event models for naive Bayes text classification, Proc. AAAI Workshop Learn. Text Categorization, 752, 41
Schölkopf, Support vector method for novelty detection, Proc. Adv. Neural Inf. Process. Syst., 582
Selvakani, 2007, Genetic algorithm for framing rules for intrusion detection, Int. J. Comput. Sci. Netw. Security, 7, 285
Gyanchandani, 2012, Taxonomy of anomaly based intrusion detection system: A review, Int. J. Sci. Res. Publ., 2, 1
Ariu, HMMPayl: An application of HMM to the analysis of the HTTP payload, Proc. WAPA, 81
Abadi, 2006, An ant colony optimization algorithm for network vulnerability analysis, Iran. J. Elect. Elect. Eng., 2, 106
Sewell, 2008, Ensemble learning, Res. Note, 11, 1
Bouzida, Neural networks vs. decision trees for intrusion detection, Proc. IEEE/IST Workshop Monitor. Attack Detection Mitigation (MonAM), 28, 29
Amoli, 2016, Unsupervised network intrusion detection systems for zero-day fast-spreading attacks and botnets, Int. J. Digit. Content Technol. Its Appl., 10, 1
Yassin, Anomaly-based intrusion detection through k-means clustering and Naives Bayes classification, Proc. 4th Int. Conf. Comput. Informat. (ICOCI), 298
Mamun, An entropy based encrypted traffic classifier, Proc. Int. Conf. Inf. Commun. Security, 282
Chowdhury, Network intrusion detection using machine learning, Proc. Int. Conf. Security Manag. (SAM), 1
Moustafa, A hybrid feature selection for network intrusion detection systems: Central points, Proc. 16th Aust. Inf. Warfare Conf., 1
Olusola, Analysis of KDD ’99 intrusion detection dataset for selection of relevance features, Proc. World Congr. Eng. Comput. Sci., 1, 20
Kayacik, Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets, Proc. 3rd Annu. Conf. Privacy Security Trust, 1
2016, Weka 3.8.1: Data Mining Software in Java
Pedregosa, 2011, Scikit-learn: Machine learning in Python, J. Mach. Learn. Res., 12, 2825
2017, Installing Tensorflow
2017, Knime 3.4.1: Download Knime Analytics Platform & SDK
2017, Real Data Science, Fast and Simple (Stable Release 7.5)
2014, MOA (Massive Online Analysis)
Meng, 2016, MLlib: Machine learning in apache spark, J. Mach. Learn. Res., 17, 1235
Aminanto, Deep learning in intrusion detection system: An overview, Proc. Int. Res. Conf. Eng. Technol., 1
Wang, The applications of deep learning on traffic identification, BlackHat, 1
Yan, On accurate and reliable anomaly detection for gas turbine combustors: A deep learning approach, Proc. Annu. Conf. Prognostics Health Manag. Soc., 1
Jung, Poster: Deep learning for zero-day flash malware detection, Proc. 36th IEEE Symp. Security Privacy, 1
1998, UNM Dataset
Hodo, 2017, Shallow and deep networks intrusion detection system: A taxonomy and survey, ACM Survey