최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of Internet Computing and Services = 인터넷정보학회논문지, v.22 no.1, 2021년, pp.13 - 22
민병준 (Dept. of Computer Science, Sejong University) , 유지훈 (Dept. of Computer Science, Sejong University) , 김상수 (Agency for Defense Development) , 신동일 (Dept. of Computer Science, Sejong University) , 신동규 (Dept. of Computer Science, Sejong University)
Recently network based attack technologies are rapidly advanced and intelligent, the limitations of existing signature-based intrusion detection systems are becoming clear. The reason is that signature-based detection methods lack generalization capabilities for new attacks such as APT attacks. To s...
M. Thottan and C. Ji, "Anomaly detection in IP networks", IEEE Transactions on signal processing, vol. 51, no. 8, pp. 2191-2204, 2003. https://doi.org/10.1109/tsp.2003.814797
M. Ahmed, A. N. Mahmood and J. Hu, "A survey of network anomaly detection techniques", Journal of Network and Computer Applications, vol 60, pp. 19-31, 2016. https://doi.org/10.1016/j.jnca.2015.11.016
J. Song, H. Takakura, Y. Okabe and Y. Kwon, "Correlation analysis between honeypot data and IDS alerts using one-class SVM", Intrusion Detection Systems, pp. 173-192, 2011. https://doi.org/10.5772/13951
R. Longadge and S. Dongre, "Class imbalance problem in data mining review", 2013. Preprint at https://arxiv.org/abs/1305.1707
S. Barua, M. M. Islam, X. Yao and K. Murase, "MWMOTE--majority weighted minority oversampling technique for imbalanced data set learning", IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 2, pp. 405-425, 2012. https://doi.org/10.1109/tkde.2012.232
L. M. Manevitz and M. Yousef, "One-class SVMs for document classification", Journal of machine Learning research, vol 2, pp. 139-154, 2001. https://dl.acm.org/doi/10.5555/944790.944808
A. Borghesi, A. Bartolini, M. Lombardi, M. Milano and L. Benini, "Anomaly detection using autoencoders in high performance computing systems", In Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp. 9428-9433, 2019. https://doi.org/10.1609/aaai.v33i01.33019428
Y. Yang, K. Zheng, C. Wu and Y. Yang, "Improving the classification effectiveness of intrusion detection by using improved conditional variational autoencoder and deep neural network", Sensors, vol. 19, no. 11, pp. 2528, 2019. https://doi.org/10.3390/s19112528
A. Javaid, Q. Niyaz, W. Sun, and M. Alam, "A deep learning approach for network intrusion detection system", In Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp. 21-26, 2016. https://dl.acm.org/doi/10.4108/eai.3-12-2015.2262516
C. Yin, Y. Zhu, J. Fei and X. He, "A deep learning approach for intrusion detection using recurrent neural networks", Ieee Access, vol. 5, pp. 21954-21961, 2017. https://doi.org/10.1109/access.2017.2762418
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.