최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보처리학회논문지. KIPS transactions on software and data engineering. 소프트웨어 및 데이터 공학, v.12 no.2, 2023년, pp.99 - 110
윤동현 (성균관대학교 정보보호학과) , 구자환 (성균관대학교 소프트웨어융합대학) , 원동호 (성균관대학교 소프트웨어융합대학)
This study proposed a classification of malicious network traffic using the cyber threat framework(Mitre ATT&CK) and machine learning to solve the real-time traffic detection problems faced by current security monitoring systems. We applied a network traffic dataset called UNSW-NB15 to the Mitre ATT...
Cisco, Visual Networking Index: Global Mobile Data?Traffic Forecast Update 2017-2022 [Internet], https://www.cisco.com/c/dam/global/ko_kr/solutions/service-provider/visual-networking-index-vni/.
The institute of Foreign Affairs and National Security(ROK?Gov), Cyberwarfare in the Russo-Ukraine War: Evaluation?and Implications [Internet], https://www.ifans.go.kr/.
National Intelligence service Republic of Korea, Operational?Rules for Cybersecurity (Goverment Rule) [Internet],?https://www.law.go.kr/.
H. Hwang, D. Moon, and I. Kim, "Trend and issue dynamic?analysis for malware," in Proceedings of the Korea?Information Processing Society Conference, The KIPS, pp.418-420, 2015.
J. W. Ji, "Problems of cyber security control system and?the application of machine learning technology," Review?of Korea Institue of Information Security and Cryptology, Vol.31, No.3, pp.13-19, 2021.
K. H. Kim, K. D. Park, and M. N Sim, "A study on the?organizational conflict and job withdrawal intention of the?information security workers," Journal of the Korea Institute?of Information Security & Cryptology, Vol.29, No.2, pp.451-463, 2019.
Mitre, Mitre ATT&CK [Internet], https://attack.mitre.org.
T. Chen and C. Guestrin. "Xgboost: A scalable tree boosting?system," in Proceedings of the 22nd ACM SIGKDD International?Conference on Knowledge Discovery and Data?Mining, ACM SIGKDD, 2016, pp.785-794.
G. Ke et al., "Lightgbm: A highly efficient gradient boosting?decision tree," in Advances in Neural Information Processing?Systems, 30, NIPS, 2017.
A. V. Dorogush, V. Ershov, and A. Gulin, "CatBoost:?gradient boosting with categorical features support." arXiv preprint arXiv:1810.11363.
M. Nour and J. Slay, "UNSW-NB15: A comprehensive data?set for network intrusion detection systems (UNSW-NB15?network data set)," in 2015 Military Communications and?Information Systems Conference (MilCIS), IEEE, 2015, pp.1-6.
I. H. Seok, K. T. Lee, J. H. Yu, and S. J. Kim, "CNN based?Real-Time DNS DDoS attack detection system," The KIPS?Transactions on Computer and Communication Systems, Vol.6, No.3, pp.135-142, 2017.
M. Hammad, W. El-medany, and Y. Ismail, "Intrusion detection?system using feature selection with clustering and?classification machine learning algorithms on the unswnb15?dataset," in 2020 International Conference on Innovation?and Intelligence for Informatics, Computing and?Technologies (3ICT), IEEE, pp.1-6, 2020.
S. S. Kim, L. Chen, and J. Y. Kim, "Intrusion prediction?using long short-term memory deep learning with UNSWNB15,"?in 2021 IEEE/ACIS 6th International Conference?on Big Data, Cloud Computing, and Data Science (BCD), IEEE, 2021.
P. Singh, J. Jaykumar, A. Pankaj, and R. Mitra "Edge-detect:?Edge-centric network intrusion detection using deep?neural network," in 2021 IEEE 18th Annual Consumer?Communications & Networking Conference (CCNC), IEEE, 2021.
Y. H. Lee, S. H. Baek, J. W. Seo, I. Y. Bang, and Y. H.?Paek, "A study of cyber attacks and recent defense system:?DDoS detection and applying deep learning," in Proceedings?of the Korea Information Processing Society Conference,?The KIPS, pp.302-305, 2017.
P. D. Yoon and K. H. Hwang, "Malicious traffic detection?using ensemble learning based on UNSW-NB15 dataset,"?in 2021 KICS Winter Conference, KICS, 2021.
D. B. Lee and J. H. Seo, "Classification performance improvement?of UNSW-NB15 dataset based on feature?selection," Journal of the Korea Convergence Society, Vol. 10, No.5, pp.35-42, 2019.
R. Malhotra and S. Kamal, "An empirical study to investigate?oversampling methods for improving software defect?prediction using imbalanced data," Neurocomputing,?Vol.343, pp.120-140, 2019.
R. Mohammed, J. Rawashdeh, and M. Abdullah, "Machine?learning with oversampling and undersampling techniques:?Overview study and experimental results," in 2020?11th International Conference on Information and Communication?Systems (ICICS), IEEE, 2020, pp.243-248.
N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P.?Kegelmeyer, "SMOTE: Synthetic minority over-sampling?technique," Journal of Artificial Intelligence Research,?Vol.16, pp.321-357, 2002.
H. He, Y. Bai, E. A. Garcia, and S. Li, "ADASYN: Adaptive?synthetic sampling approach for imbalanced learning," in?2008 IEEE International Joint Conference on Neural Networks?(IEEE World Congress on Computational Intelligence),?IEEE, pp.1322-1328, 2008.
H. Han, W. Y Wang, and B. H. Mao, "Borderline-SMOTE:?A new over-sampling method in imbalanced data sets?learning," in International Conference on Intelligent Computing.?Springer, 2005.
Lockheedmartine, Cyber Kill Chain [Internet], https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-ki-chain.html.
Y. I. Yoon, J. H. Kim, J. Y. Lee, S. D. Yu, and S. J. Lee,?"A research on cyber kill chain and TTP by APT attack?case study," Jouranl of Information and Security, Vol.20,?No.4, pp91-101, 2020.
J. Wang, B. Hu, X. Li, and Z. Yang, "GTC forest: An ensemble?method for network structured data classification,"?in 2018 14th International Conference on Mobile Ad-Hoc?and Sensor Networks (MSN), IEEE, pp.81-85, 2018.
T. Akiba, S. Sano, T. Yanase, T. Ohta, and M. Koyama,?"Optuna: A next-generation hyperparameter optimization?framework," in Proceedings of the 25th ACM SIGKDD?International Conference on Knowledge Discovery & Data?Mining, ACM SIGKDD, pp2623-2631, 2019.
E. Al Daoud, "Comparison between XGBoost, LightGBM?and CatBoost using a home credit dataset," International?Journal of Computer and Information Engineering, Vol.13,?No.1, pp.6-10, 2019.
J. H. Hong and B. Y. Lee, "Artificial intelligence-based?security control construction and countermeasures," Journal?of the Korea Contents Association, Vol.21, No.1, pp.531-540, 2021.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.