최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of Internet Computing and Services = 인터넷정보학회논문지, v.22 no.3, 2021년, pp.45 - 52
김동욱 (Department of Computer Engineering, Gachon University) , 신건윤 (Department of Computer Engineering, Gachon University) , 윤지영 (Department of Software, Gachon University) , 김상수 (Agency for Defense Development Songpa) , 한명묵 (Department of Software, Gachon University)
Although many studies have been conducted to identify unknown attacks in cyber security intrusion detection systems, studies based on outliers are attracting attention. Accordingly, we identify outliers by defining categories for unknown attacks. The unknown attacks were investigated in two categori...
Khraisat. A, Gondal. I, Vamplew. P, and Kamruzzaman. J, "Survey of intrusion detection systems: techniques, datasets and challenges", Cybersecurity, Vol. 2, No. 1, pp. 1-22, 2019. https://doi.org/10.1186/s42400-019-0038-7
Lee. W, Stolfo. S. J, "A framework for constructing features and models for intrusion detection systems", ACM transactions on Information and system security, Vol. 3, No. 4, pp. 227-261, 2000. https://doi.org/10.1145/382912.382914
Sen. J, Mehtab. S, "Machine Learning Applications in Misuse and Anomaly Detection", arXiv preprint arXiv:2009.06709, 2020. http://doi.org/10.5772/intechopen.92653
Yamada. A, Miyake. Y, Takemori. K, and Tanaka. T, "Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data", Proceedings of International Conference on Information Technology: Coding and Computing, Vol. 1. pp. 650-655 2006. https://doi.org/10.1109/ITCC.2005.178
Chandola. V, Banerjee. A, Kumar. V, "Anomaly detection: a survey", ACM computing surveys (CSUR), Vol. 41, No. 3, pp. 15-58, 2009. https://doi.org/10.1145/1541880.1541882
Marco A.F. Pimentel, David A. Clifton, Lei Clifton, and Lionel Tarassenko. "A review of novelty detection. Signal Processing", Vol. 99, pp. 215-249, 2014. https://doi.org/10.1016/j.sigpro.2013.12.026
Lin, Zilong, Yong Shi, and Zhi Xue, "IDSGAN: Generative adversarial networks for attack generation against intrusion detection." arXiv preprint arXiv:1809.02077, 2018. https://arxiv.org/abs/1809.02077
Piplai, Aritran, Sai Sree Laya Chukkapalli, and Anupam Joshi, "NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion." 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS). IEEE, 2020. https://doi.org/10.1109/BigDataSecurity-HPSC-IDS49724.2020.00020
Kliger, Mark, Shachar Fleishman, "Novelty detection with gan", arXiv preprint arXiv:1802.10560, 2018. https://arxiv.org/abs/1802.10560
Geng, Chuanxing, Sheng-jun Huang, and Songcan Chen, "Recent advances in open set recognition: A survey", IEEE transactions on pattern analysis and machine intelligence, 2020 https://doi.org/10.1109/TPAMI.2020.2981604
Ji. Soo Yeon, Jeong. Bong Keun, Choi. Seonho, and Jeong. Dong Hyun, "A multi-level intrusion detection method for abnormal network behaviors", Journal of Network and Computer Applications, Vol. 62 pp. 9-17, 2016. https://doi.org/10.1016/j.jnca.2015.12.004
TAN Jun, CHEN Xing-shu, DU Min, and ZHU Kai, "A novel internet traffic identification approach using wavelet packet decomposition and neural network", Journal of Central South University, Vol. 19, No. 8, pp. 2218-2230, 2012. http://doi.org/10.1007/s11771-012-1266-0
Golan, Izhak, Ran El-Yaniv, "Deep anomaly detection using geometric transformations", arXiv preprint arXiv:1805.10917, 2018. https://arxiv.org/abs/1805.10917
Ritesh K. Malaiya, Donghwoon Kwon, Jinoh Kim, Sang C. Suh, Hyunjoo Kim, and Ikkyun Kim, "An empirical evaluation of deep learning for network anomaly detection", 2018 International Conference on Computing, Networking and Communications (ICNC), pp. 893-898, 2018. https://doi.org/10.1109/ICCNC.2018.8390278
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.