[1]HMEDM A,MAHMOOD A N,HU J.A survey of network anomaly detection techniques[J].Journal of Network and Computer Applications,2016,60:19-31.
[2]KIM G,LEE S,KIM S.A novel hybrid intrusion detection method integrating anomaly detection with misuse detection[J].Expert Systems with Applications,2014,41(4):1690-1700.
[3]VASAN K K,SURENDIRAN B.Dimensionality reduction using principal component analysis for network intrusion detection[J].Perspectives in Science,2016,8(C):510-512.
[4]李强,严承华,朱瑶.基于决策树的网络流量异常分析与检测[J].计算机工程,2012,38(5):92-95.
[5]AMMAR A.A decision tree classifier for intrusion detection priority tagging[J].Journal of Computer and Communications,2015,3(4):52-58.
[6]许倩,程东年.基于层次聚类的网络流量异常分类算法[J].计算机工程,2012,38(23):131-136.
[7]HORNG S J,SU M Y,CHEN Y H,et al.A novel intrusion detection system based on hierarchical clustering and support vector machines[J].Expert Systems with Applications,2011,38(1):306-313.
[8]MALIK A J,SHAHZAD W,KHAN F A.Network intrusion detection using hybrid binary PSO and random forests algorithm[J].Security and Communication Networks,2015,8(16):2646-2660.
[9]WANG H,GU J,WANG S.An effective intrusion detection framework based on SVM with feature augmentation[J].Knowledge-Based Systems,2017,136:130-139.
[10]RAMAN M R G,SOMU N,KIRTHIVASAN K,et al.An efficient intrusion detection system based on hypergraph-genetic algorithm for parameter optimization and feature selection in support vector machine[J].Knowledge-Based Systems,2017,134:1-12.
[11]马林进,万良,马绍菊,等.基于词袋模型聚类的异常流量识别方法[J].计算机工程,2017,43(5):204-209.
[12]ABUROMMAN A A,REAZ M B I.A survey of intrusion detection systems based on ensemble and hybrid classifiers[J].Computers and Security,2017,65:135-152.
[13]JI S Y,JEONG B K,CHOI S,et al.A multi-level intrusion detection method for anomaly network behaviors[J].Journal of Network and Computer Applications,2016,62:9-17.
[14]杨宏宇,徐晋.基于改进随机森林算法的Android恶意软件检测[J].通信学报,2017,38(4):8-16.
[15]GEURTS P,ERNST D,WEHENKEL L.Extremely randomized trees[J].Machine Learning,2006,63(1):3-42.
[16]TAVALLAEE M,BAGHERI E,LU W,et al.A detailed analysis of the KDD CUP 99 data set[C]//Proceedings of IEEE International Conference on Computational Intelligence for Security and Defense Applications.Washington D.C.,USA:IEEE Press,2009:53-58.
[17]PEDREGOSA F,GRAMFORT A,MICHEL V,et al.Scikit-learn:machine learning in Python[J].Journal of Machine Learning Research,2013,12(10):2825-2830.
|