Accelerating convolutional neural network-based malware traffic detection through ant-colony clustering
Tóm tắt
Từ khóa
Tài liệu tham khảo
Deng, 2014, Deep learning: Methods and applications, Foundations and Trends® in Signal Processing, 7, 197, 10.1561/2000000039
Najafabadi, 2015, Deep learning applications and challenges in big data analytics, Journal of Big Data, 2, 1, 10.1186/s40537-014-0007-7
Moore, 2005, International Workshop on Passive and Active Network Measurement, 41, 10.1007/978-3-540-31966-5_4
A. Dainotti , A. Pescape and K.C. Claffy , Issues and future directions in traffic classification, IEEE Network 26(1) (2012). https://doi.org/10.1109/MNET.2012.6135854
Xiao, 2014, Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE 38th International, 128
Chen, 2016, Anomaly network intrusion detection using hidden Markov model, Int J Innov Comput Inform Control, 12, 569
Kolosnjaji, 2017, Neural Networks (IJCNN), 2017 International Joint Conference on, 3838, 10.1109/IJCNN.2017.7966340
Wang, 2017, Adversary resistant deep neural networks with an application to malware detection, Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1145, 10.1145/3097983.3098158
Wang, 2017, Malware traffic classification using convolutional neural network for representation learning, Information Networking (ICOIN), 2017 International Conference on, 712, 10.1109/ICOIN.2017.7899588
Yuan, 2016, Droiddetector: Android malware characterization and detection using deep learning, Tsinghua Science and Technology, 21, 114, 10.1109/TST.2016.7399288
Yu, 2006, Fast and memory-efficient regular expression matching for deep packet inspection, Architecture for Networking and Communications Systems, 2006 ANCS 2006 ACM/IEEE Symposium on, 93, 10.1145/1185347.1185360
Kumar, 2007, Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia, Proceedings of the 3rd ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 155, 10.1145/1323548.1323574
Buczak, 2016, A survey of data mining and machine learning methods for cyber security intrusion detection, IEEE Communications Surveys & Tutorials, 18, 1153, 10.1109/COMST.2015.2494502
Xie, 2009, A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors, IEEE/ACM Transactions on Networking (TON), 17, 54, 10.1109/TNET.2008.923716
Feng, 2014, Mining network data for intrusion detection through combining SVMs with ant colony networks, Future Generation Computer Systems, 37, 127, 10.1016/j.future.2013.06.027
Kolosnjaji, 2016, Deep learning for classification of malware system call sequences, Australasian Joint Conference on Artificial Intelligence, 137
Gandotra, 2014, Malware analysis and classification: A survey, Journal of Information Security, 5, 56, 10.4236/jis.2014.52006
Dorigo, 2006, Ant colony optimization, IEEE Computational Intelligence Magazine, 1, 28, 10.1109/MCI.2006.329691
Caselli, 2015, Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 13, 10.1145/2732198.2732200
Ding, 2016, Event-based security control for discrete-time stochastic systems, IET Control Theory & Applications, 10, 1808, 10.1049/iet-cta.2016.0135