최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of Internet Computing and Services = 인터넷정보학회논문지, v.22 no.2, 2021년, pp.29 - 39
유지훈 (Dept. of Computer Science, Sejong University) , 민병준 (Dept. of Computer Science, Sejong University) , 김상수 (Agency for Defense Development) , 신동일 (Dept. of Computer Science, Sejong University) , 신동규 (Dept. of Computer Science, Sejong University)
As damages to individuals, private sectors, and businesses increase due to newly occurring cyber attacks, the underlying network security problem has emerged as a major problem in computer systems. Therefore, NIDS using machine learning and deep learning is being studied to improve the limitations t...
F. Amiri, R. Y. Mohammad, L. Caro, S. Azadeh and Y. Nasser, "Mutual Information - Based Feature Selection for Intrusion Detection System", Journal of Network and Computer Applications, vol. 34, pp. 1184-1199, 2011. https://doi.org/10.1016/j.jnca.2011.01.002
Alhomoud, Adeeb, et al. "Performance evaluation study of intrusion detection systems," Procedia Computer Science 5, 173-180, 2011. https://doi.org/10.1016/j.procs.2011.07.024
Liao, Hung-Jen, et al. "Intrusion detection system: A comprehensive review." Journal of Network and Computer Applications 36.1, 16-24, 2013. https://doi.org/10.1016/j.jnca.2012.09.004
Casas, Pedro, Johan Mazel, and Philippe Owezarski. "Unsupervised network intrusion detection systems: Detecting the unknown without knowledge." Computer Communications 35.7, 772-783, 2012. https://doi.org/10.1016/j.comcom.2012.01.016
KDD. KDD CUP. Available online: https://kdd.ics.uci.edu/databases/kddcup99/task.html (accessed on 17 March 2020).
McHugh, John. "Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory." ACM Transactions on Information and System Security (TISSEC) 3.4, 262-294, 2000. https://doi.org/10.1145/382912.382923
Laskov, Pavel, et al. "Learning intrusion detection: supervised or unsupervised?" International Conference on Image Analysis and Processing. Springer, Berlin, Heidelberg, 2005. https://doi.org/10.1007/11553595_6
H. S. Chae, B. O. Jo, S. H. Choi, and T. K. Park, "Feature Selection for Intrusion Detection using NSL-KDD," Recent Advances in Computer Science, pp. 184-187, 2013. http://www.wseas.us/e-library/conferences/2013/Nanjing/ACCIS/ACCIS-30.pdf
Sabhnani M., Serpen G., "Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context." In Proceedings of the International Conference on Machine Learning; Models, Technologies and Applications, pp. 209-215, Las Vegas, NV, USA, 23-26 June 2003. https://neuro.bstu.by/ai/To-dom/My_research/Papers-0/For-research/D-mining/Anomaly-D/KDD-cup-99/CD4/mlmta03.pdf
Yao, J.T., Zhao S., Fan L. "An enhanced support vector machine model for intrusion detection," in Proceedings of the International Conference on Rough Sets and Knowledge Technology, pp. 538-543, Chongqing, China, 24-26 July 2006. https://doi.org/10.1007/11795131_78
Lakhina, Shilpa, Sini Joseph, and Bhupendra Verma, Feature reduction using principal component analysis for effective anomaly-based intrusion detection on NSL-KDD, 2010. http://www.ijest.info/docs/IJEST10-02-06-56.pdf
Imamverdiyev, Yadigar, and Fargana Abdullayeva, "Deep learning method for denial of service attack detection based on restricted boltzmann machine," Big Data 6.2, 159-169, 2018. https://doi.org/10.1089/big.2018.0023
Lopez-Martin, Manuel, Belen Carro, and Antonio Sanchez-Esguevillas, "Application of deep reinforcement learning to intrusion detection for supervised problems," Expert Systems with Applications 141, 112963, 2020. https://doi.org/10.1016/j.eswa.2019.112963
Gao, Minghui, et al. "Malicious Network Traffic Detection Based on Deep Neural Networks and Association Analysis." Sensors 20.5, 1452, 2020. https://doi.org/10.3390/s20051452
Bedi, Punam, Neha Gupta, and Vinita Jindal. "I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems," Applied Intelligence, 1-19, 2020. https://doi.org/10.1007/s10489-020-01886-y
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.