최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기The journal of the institute of internet, broadcasting and communication : JIIBC, v.20 no.3, 2020년, pp.1 - 7
이민욱 (국방과학연구소 기술원)
With the increase in cyber attacks, automated IDS using machine learning is being studied. According to recent research, the IDS using the recursive learning model shows high detection performance. However, the simple application of the recursive model may be difficult to reflect the associated sess...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Christiaan Beek, Taylor Dunton, John Fokker, Steve Grobman, Tim Hux, Tim Polzer, Marc Rivero Lopez, Thomas Roccia, Jessica Saavedra-Morales, Raj Samani,Ryan Sherstobitof, ,McAfee Labs Thread Report 2019, Aug 2019 DOI:https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-aug-2019.pdf
Um, J.G., Kwon, H. Y., "Model Proposal for Detection Method of Cyber Attack using SIEM", The journal of the institute of internet, broadcasting and communication(JIIBC), vol. 16, no. 6, pp. 43-54, Dec. 2016. DOI: http://dx.doi.org/10.7236/JIIBC.2016.16.6.43
Jeon, D. J., Park, D.G., "Real-time Linux Malware Detection Using Machine Learning," The Journal of Korean Institute of Information Technology(JKIIT), vol. 17, no. 7, pp. 111-122, Jul. 2019. DOI: http://dx.doi.org/10.14801/jkiit.2019.17.7.111
Lim, W. G., Kwon, K. H., Kim, J. J., Lee, J. E., Cha, S. H., "Comparison and Analysis of Anomaly Detection Methods for Detecting Data Exfiltration" Journal of the Korea Academia Industrial cooperation Society(JKAIS), vol. 17, no. 9, pp. 440-446, Sep. 2016. DOI: http://dx.doi.org/10.5762/KAIS.2016.17.9.440
Muda, Z., Yassin, W., Sulaiman, M. N., & Udzir, N. I., A K-Means and Naive Bayesian learning approach for better intrusion detection. Information technology journal, 10(3), pp. 648-655, 2011 DOI: https://doi.org/10.3923/itj.2011
Liao, Yihua, and V. Rao Vemuri, Use of k-nearest neighbor classifier for intrusion detection, Computers & Security 21.5, pp.439-448, 2002. DOI : https://doi.org/10.1016/S0167-4048(02)00514-X
Farnaaz, N., & Jabbar, M. A. Random forest modeling for network intrusion detection system. Procedia Computer Science, 89(1), pp. 213-217. 2016. DOI: https://doi.org/10.1016/j.procs.2016.06.047
Yin, C., Zhu, Y., Fei, J., & He, X. A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access, 5, pp. 21954-21961, 2017. DOI: https://doi.org/10.1109/ACCESS.2017.2762418
Kim, J., Kim, J., Thu, H. L. T., & Kim, H, Long Short-Term memory recurrent neural network classifier for intrusion detection. In 2016 International Conference on Platform Technology and Service (PlatCon) pp. 1-5, Feb, 2016. DOI: https://doi.org/10.1109/PlatCon.2016.7456805
Chan, P. K., & Mahoney, M. V. Detecting Novel Attacks by Identifying Anomalous Network Packet Headers. Florida Tech., 2001 DOI: http://hdl.handle.net/11141/87
Perdisci, R., Ariu, D., Fogla, P., Giacinto, G., & Lee, W. McPAD: A multiple classifier system for accurate payload-based anomaly detection. Computer networks, 53(6), pp. 864-881, 2009. DOI: https://doi.org/10.1016/j.comnet.2008.11.011
Liu, H., Lang, B., Liu, M., & Yan, H. CNN and RNN based payload classification methods for attack detection. Knowledge-Based Systems, 163, pp. 332-341. 2019. DOI: https://doi.org/10.1016/j.knosys.2018.08.036
Wang, K., & Stolfo, S. J. Anomalous payload-based network intrusion detection. In International workshop on recent advances in intrusion detection pp. 203-222. Sep, 2004. DOI: https://doi.org/10.1007/978-3-540-30143-1_11
Zhang, C., Ruan, F., Yin, L., Chen, X., Zhai, L., & Liu, F. A Deep Learning Approach for Network Intrusion Detection Based on NSL-KDD Dataset. In 2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID) pp. 41-45. Oct, 2019. DOI: https://doi.org/10.1109/ICASID.2019.8925239
Chadza, T., Kyriakopoulos, K. G., & Lambotharan, S. Contemporary Sequential Network Attacks Prediction using Hidden Markov Model. In 2019 17th International Conference on Privacy, Security and Trust (PST) pp. 1-3, Aug 2019. DOI: https://doi.org/10.1109/PST47121.2019.8949035
Yu, Y., Long, J., & Cai, Z. Session-based network intrusion detection using a deep learning architecture. In International Conference on Modeling Decisions for Artificial Intelligence, pp. 144-155. Oct, 2017. DOI: https://doi.org/10.1007/978-3-319-67422-3_13
Hochreiter, S., & Schmidhuber, J. Long short-term memory. Neural computation, 9(8), pp. 1735-1780. 1997. DOI: https://doi.org/10.1162/neco.1997.9.8.1735
Communications Security Establishment & Canadian Institute for Cybersecurity ,CSE-CIC-IDS2018 DATASET, https://www.unb.ca/cic/datasets/ids-2018.html
Sung, A. H., Mukkamala, S. The feature selection and intrusion detection problems. In Annual Asian Computing Science Conference, pp. 468-482. Dec, 2004. DOI: https://doi.org/10.1007/978-3-540-30502-6_34
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.