Accelerating convolutional neural network-based malware traffic detection through ant-colony clustering

Journal of Intelligent & Fuzzy Systems - Tập 37 Số 1 - Trang 409-423 - 2019
He Huang1,2, Haojiang Deng1, Yiqiang Sheng1, Xiaozhou Ye1
1National Network New Media Engineering Research Center, Institute of Acoustics, University of Chinese Academy of Science, Beijing, China
2School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Science

Tóm tắt

Từ khóa


Tài liệu tham khảo

Deng, 2014, Deep learning: Methods and applications, Foundations and Trends® in Signal Processing, 7, 197, 10.1561/2000000039

Najafabadi, 2015, Deep learning applications and challenges in big data analytics, Journal of Big Data, 2, 1, 10.1186/s40537-014-0007-7

Moore, 2005, International Workshop on Passive and Active Network Measurement, 41, 10.1007/978-3-540-31966-5_4

A. Dainotti , A. Pescape and K.C. Claffy , Issues and future directions in traffic classification, IEEE Network 26(1) (2012). https://doi.org/10.1109/MNET.2012.6135854

Xiao, 2014, Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE 38th International, 128

Chen, 2016, Anomaly network intrusion detection using hidden Markov model, Int J Innov Comput Inform Control, 12, 569

Kolosnjaji, 2017, Neural Networks (IJCNN), 2017 International Joint Conference on, 3838, 10.1109/IJCNN.2017.7966340

Wang, 2017, Adversary resistant deep neural networks with an application to malware detection, Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1145, 10.1145/3097983.3098158

Wang, 2017, Malware traffic classification using convolutional neural network for representation learning, Information Networking (ICOIN), 2017 International Conference on, 712, 10.1109/ICOIN.2017.7899588

Yuan, 2016, Droiddetector: Android malware characterization and detection using deep learning, Tsinghua Science and Technology, 21, 114, 10.1109/TST.2016.7399288

Yu, 2006, Fast and memory-efficient regular expression matching for deep packet inspection, Architecture for Networking and Communications Systems, 2006 ANCS 2006 ACM/IEEE Symposium on, 93, 10.1145/1185347.1185360

Kumar, 2007, Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia, Proceedings of the 3rd ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 155, 10.1145/1323548.1323574

Buczak, 2016, A survey of data mining and machine learning methods for cyber security intrusion detection, IEEE Communications Surveys & Tutorials, 18, 1153, 10.1109/COMST.2015.2494502

Xie, 2009, A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors, IEEE/ACM Transactions on Networking (TON), 17, 54, 10.1109/TNET.2008.923716

Feng, 2014, Mining network data for intrusion detection through combining SVMs with ant colony networks, Future Generation Computer Systems, 37, 127, 10.1016/j.future.2013.06.027

Kolosnjaji, 2016, Deep learning for classification of malware system call sequences, Australasian Joint Conference on Artificial Intelligence, 137

Gandotra, 2014, Malware analysis and classification: A survey, Journal of Information Security, 5, 56, 10.4236/jis.2014.52006

Dorigo, 2006, Ant colony optimization, IEEE Computational Intelligence Magazine, 1, 28, 10.1109/MCI.2006.329691

Caselli, 2015, Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 13, 10.1145/2732198.2732200

Ding, 2016, Event-based security control for discrete-time stochastic systems, IET Control Theory & Applications, 10, 1808, 10.1049/iet-cta.2016.0135

Modi, 2013, A survey of intrusion detection techniques in cloud, Journal of Network and Computer Applications, 36, 42, 10.1016/j.jnca.2012.05.003