[1] |
DENNING D E.An intrusion-detection model[J].IEEE Transactions on Software Engineering,1987,13(2):222-232.
|
[2] |
ANDERSON J P.Computer security threat monitoring and surveillance[R].Ford,USA:James P.Anderson Company,1980.
|
[3] |
WANG Ke,STOLFO S J.Anomalous payload-based network intrusion detection[C]//Proceedings of International Workshop on Recent Advances in Intrusion Detection.Berlin,Germany:Springer,2004:203-222.
|
[4] |
GADDAM S R,PHOHA V V,BALAGANI K S.K-means+ID3:a novel method for supervised anomaly detection by cascading k-means clustering and ID3 decision tree learning methods[J].IEEE Transactions on Knowledge and Data Engineering,2007,19(3):345-354.
|
[5] |
PANDA M,PATRA M R.Network intrusion detection using Naive Bayes[J].International Journal of Computer Science and Network Security,2007,7(12):258-263.
|
[6] |
AMOR N B,BENFERHAT S,ELOUEDI Z.Naive Bayes vs decision trees in intrusion detection systems[J].ACM Symposium on Applied Computing,2004,18(6):420-424.
|
[7] |
QUINLAN J R.Induction of decision trees[J].Machine Learning,1986,1(1):81-106.
|
[8] |
KAYACIK H G,ZINCIR-HEYWOOD A N,HEYWOOD M I.Selecting features for intrusion detection:a feature relevance analysis on KDD 99 intrusion detection datasets[C]//Proceedings of the 3rd Annual Conference on Privacy,Security and Trust.Washington D.C.,USA:IEEE Press,2005:1-6.
|
[9] |
BOUZIDA Y,CUPPENS F,CUPPENS-BOULAHIA N,et al.Efficient intrusion detection using principal component analysis[C]//Proceedings of the 3rd Conference on Security and Network Architectures.La Londe,France:[s.n.],2004:1-12.
|
[10] |
THASEEN I S,KUMAR C A.Intrusion detection model using fusion of PCA and optimized SVM[C]//Proceedings of International Conference on Contemporary Computing and Informatics.Washington D.C.,USA:IEEE Press,2015:879-884.
|
[11] |
AHMAD I,HUSSAIN M,ALGHAMDI A,et al.Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components[J].Neural Computing and Applications,2014,24(7/8):1671-1682.
|
[12] |
ABUROMMAN A A,REAZ M B I.Ensemble of binary SVM classifiers based on PCA and LDA feature extraction for intrusion detection[C]//Proceedings of Advanced Information Management,Communicates,Electronic and Automation Control Conference.Washington D.C,USA:IEEE Press,2017:636-640.
|
[13] |
HADRI A,CHOUGDALI K,TOUAHNI R.Intrusion detection system using PCA and fuzzy PCA techniques[C]//Proceedings of International Conference on Advanced Com-munication Systems and Information Security.Washington D.C.,USA:IEEE Press,2016:1-7.
|
[14] |
ELKHADIR Z,CHOUGDALI K,BENATTOU M.Intrusion detection system using PCA and kernel PCA methods[J].International Journal of Computer Science,2016,43:72-79.
|
[15] |
HETTICH S,BAY S D.KDD cup 1999 data[EB/OL].[2018-02-08].http://kdd.ics.uci.edu/databases/kdd cup99/kddcup99.html.
|
[16] |
李丛,闫仁武,朱长水,等.融合FAST特征选择ABQGSA-SVM的网络入侵检测[J].计算机应用研究,2017,34(7):2172-2179.
|