최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기韓國컴퓨터情報學會論文誌 = Journal of the Korea Society of Computer and Information, v.28 no.6, 2023년, pp.47 - 54
Gun-Nam Kim (Dept. of Defense Science, Korea National Defense University) , Han-Seok Kim (Dept. of Defense Science, Korea National Defense University) , Soo-Jin Lee (Dept. of Defense Science, Korea National Defense University)
Most studies on machine learning-based intrusion detection systems use metadata. However, since metadata is information generated by analyzing packets, it is difficult to ensure real-time intrusion detection in a real network environment. Therefore, in this paper, we proposed a machine learning-base...
Ministry of Science and ICT, "Statistics Information", https://www.msit.go.kr/bbs/list.do?sCodeuser&mPid74&mId99
Australian Center for Cyber Security, "UNSW-NB15 Data Set,"?https://www.unsw.adfa.edu.au/unsw-canberra-cyber/cybersecurity/ADFA-NB15-Datasets/
N. Moustafa and J. Slay, "The evaluation of Network Anomaly?Detection Systems: Statistical analysis of the UNSW-NB15 data?set and the comparison with the KDD99 data set," Information?Security Journal: A Global Perspective, vol. 25, no. 1-3, pp. 18-31, Jan 2016. DOI: 10.1080/19393555.2015.1125974
K. Wang and S. J. Stolfo, "Anomalous Payload-Based Network?Intrusion Detection," Recent Advances in Intrusion Detection: 7th?International Symposium, pp. 203-222, Sep 2004. DOI: 10.1007/978-3-540-30143-1_11
W. Wang et al., "HAST-IDS: Learning Hierarchical Spatial-Temporal?Features Using Deep Neural Networks to Improve Intrusion?Detection," IEEE Access, vol. 6, pp. 1792-1806, 2018. DOI: 10.1109/access.2017.2780250
B. A. Pratomo, P. Burnap, and G. Theodorakopoulos, "Unsupervised?Approach for Detecting Low Rate Attacks on Network Traffic with?Autoencoder," 2018 International Conference on Cyber Security?and Protection of Digital Services (Cyber Security), pp. 1-8, Jun?2018. DOI: 10.1109/cybersecpods.2018.8560678.
H. Liu, B. Lang, M. Liu, and H. Yan, "CNN and RNN based?payload classification methods for attack detection,"?Knowledge-Based Systems, vol. 163, pp. 332-341, Jan 2019.?DOI: 10.1016/j.knosys.2018.08.036.
T. W. Kim, J. l. Jung, J. Y. Lee, "DoS/DDoS attacks Detection?Algorithm and System using Packet Counting," Journal of the?Korea Society for Simulation, vol.19, no.4, pp. 151-159, 2010.
B. H Lee, "Deep Learning LSTM Model based TCP SYN Flood?Detection System," Thesis for the Degree of Master of?Agriculture. Graduate School, KNU. Korea. 2020.
M. H. Kabir, M. S. Rajib, A. S. M. T. Rahman, Md. M. Rahman,?and S. K. Dey, "Network Intrusion Detection Using UNSW-NB15?Dataset: Stacking Machine Learning Based Approach," 2022?International Conference on Advancement in Electrical and?Electronic Engineering (ICAEEE), pp. 1-6, Feb 2022. DOI:?10.1109/icaeee54957.2022.9836404
F. Meghdouri, T. Zseby, and F. Iglesias, "Analysis of Lightweight?Feature Vectors for Attack Detection in Network Traffic,"?Applied Sciences, vol. 8, no. 11, pp 2196, Nov 2018. DOI:?10.3390/app8112196.
J. Li, C. Wu, J. Ye, J. Ding, Q. Fu, Q, and J. Huang, "The?comparison and verification of some efficient packet capture and?processing technologies,." IEEE Intl Conf on Dependable,?Autonomic and Secure Computing, Intl Conf on Pervasive?Intelligence and Computing, Intl Conf on Cloud and Big Data?Computing, Intl Conf on Cyber Science and Technology?Congress (DASC/PiCom/CBDCom/CyberSciTech), pp. 967-973,?2019. DOI: 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00177.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.