[1] ANDERSON J P.Computer security threat monitoring and surveillance[EB/OL].[2019-11-20].https://www.researchgate.net/publication. [2] KUMAR G K,KUMAR R R,BASHA M S,et al.Intrusion detection using an ensemble of support vector machines[J].Advances in Engineering,Management and Sciences,2019,3(1):266-275. [3] ALYASEEN W L,OTHMAN Z A,NAZRI M Z A,et al.Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system[J].Expert Systems with Applications,2017,67(1):296-303. [4] YANG Yangqing,ZHENG Kangfeng,WU Chuanhua,et al.Building an effective intrusion detection system using the modified density peak clustering algorithm and deep belief networks[J].Applied Sciences,2019,9(2):238-262. [5] SONG C Y,PONS A,YEN K.AA-HMM:an anti-adversarial hidden markov model for network-based intrusion detection[J].Applied Sciences,2018,8(12):1-25. [6] BREIMAN L.Random forests[J].Machine Learning,2001,45(1):5-32. [7] LEE J,PARK K.AE-CGAN model based high performance network intrusion detection system[J].Applied Science,2019,20(9):1-14. [8] REN Jiadong,LIU Xinqian,WANG Qian,et al.An multi-level intrusion detection method based on KNN outlier detection and random forests[J].Journal of Computer Research and Development,2019,56(3):566-575.(in Chinese)任家东,刘新倩,王倩,等.基于KNN离群点检测和随机森林的多层入侵检测方法[J].计算机研究与发展,2019,56(3):566-575. [9] LIU Zhaolu,ZHAO Ying,LIU Shumei.Network traffic classification based on Spark frame[J].Journal on Communications,2018,39(Z1):30-35.(in Chinese)刘兆禄,赵英,刘淑梅.基于Spark的网络流量分类方法研究[J].通信学报,2018,39(Z1):30-35. [10] BENTLEY K.The artificial immune model for network intrusion detection[C]//Proceedings of EUFIT'99.Aachen,Germany:[s.n.],1999:212-223. [11] YIN Chunyong,MA Luyu,FENG Lu.Towards accurate intrusion detection based on improved clonal selection algorithm[J].Multimedia Tools and Applications,2017,19(76):19397-19410. [12] ZHANG Ling.Research on intrusion detection model based on rough set and artificial immunity[D].Beijing:Beijing University of Posts and Telecommnications,2014.(in Chinese)张玲.基于粗糙集与人工免疫的入侵检测模型研究[D].北京:北京邮电大学,2014. [13] HE Y,MENDIS G J,WEI J.Real-time detection of false data injection attacks in smart grid:a deep learning-based intelligent mechanism[J].IEEE Transactions on Smart Grid,2017,5(8):2505-2516. [14] IMAMVERDIYEV Y,ABDULLAYEVA F.Deep learning method for denial of service attack detection based on restricted boltzmann machine[J].Big Data,2018,2(6):159-169. [15] HUANG Wanwei,ZHANG Jianwei,SUN Haiyan,et al.An anomaly detection method based on normalized mutual information feature selection and quantum wavelet neural network[J].Wireless Personal Communications,2017,96(2):2693-2713. [16] GUO Hui,LIU Zhongbao,LIU Xin.Intrusion detection method based on cloud model and decision tree[J].Computer Engineering,2019,45(4):142-147.(in Chinese)郭慧,刘忠宝,柳欣.基于云模型与决策树的入侵检测方法[J].计算机工程,2019,45(4):142-147. [17] WANG Xuren,MA Huizhen,FENG Anran,et al.Network intrusion detection method based on information gain and principal components analysis[J].Computer Engineering,2019,45(6):175-180.(in Chinese)王旭仁,马慧珍,冯安然,等.基于信息增益与主成分分析的网络入侵检测方法[J].计算机工程,2019,45(6):175-180. [18] ZHOU Zhihua.Machine learning[M].1st edition.Beijing:Tsinghua University Press,2016.(in Chinese)周志华.机器学习[M].1版.北京:清华大学出版社,2016. [19] HETTICH S,BAY S D.KDD cup 1999 data[EB/OL].[2019-11-20].http://kdd.ics.uci.edu/databaseskddcup99/. [20] ZHANG Ling,BAI Zhongying,LUO Shoushan,et al.Integrated intrusion detection model based on rough set and artificial immune[J].Journal on Communications,2013,34(9):166-176.(in Chinese)张玲,白中英,罗守山,等.基于粗糙集和人工免疫的集成入侵检测模型[J].通信学报,2013,34(9):166-176. |