| 1 |
杨秀璋, 彭国军, 刘思德, 等. 面向APT攻击的溯源和推理研究综述. 软件学报, 2025, 36 (1): 203- 252.
|
|
YANG X Z , PENG G J , LIU S D , et al. A survey on traceability and reasoning for APT attacks. Journal of Software, 2025, 36 (1): 203- 252.
|
| 2 |
王郅伟, 何睎杰, 易鑫, 等. 基于APT活动全生命周期的攻击与检测综述. 通信学报, 2024, 45 (9): 206- 228.
doi: 10.11959/j.issn.1000-436x.2024128
|
|
WANG Z W , HE X J , YI X , et al. A review of attacks and detection based on the full lifecycle of APT activities. Journal of Communications, 2024, 45 (9): 206- 228.
doi: 10.11959/j.issn.1000-436x.2024128
|
| 3 |
HAIDER R Z, ASLAM B, ABBAS H, et al. C2-DNSWatch: endpoint framework for detecting Command and Control (C2) connection of advanced persistent threats (APTs)[C]//Proceedings of the 13th International Conference on Communications, Circuits and Systems. Xiamen, China: IEEE Press, 2024: 64-69.
|
| 4 |
VUGRIN E D , HANSON S , CRUZ J , et al. Experimental validation of a command and control traffic detection model. IEEE Transactions on Dependable and Secure Computing, 2024, 21 (3): 1084- 1097.
doi: 10.1109/TDSC.2023.3266139
|
| 5 |
AZAB A , KHASAWNEH M , ALRABAEE S , et al. Network traffic classification: Techniques, datasets, and challenges. Digital Communications and Networks, 2024, 10 (3): 676- 692.
doi: 10.1016/j.dcan.2022.09.009
|
| 6 |
TIAN Y, LI Z. Dom-BERT: detecting malicious domains with pre-training model[C]//Proceedings of International Conference on Passive and Active Network Measurement. Berlin, Germany: Springer, 2024: 133-158.
|
| 7 |
ZHAO W C , HU H Z , ZHOU W G , et al. BEST: BERT pre-training for sign language recognition with coupling tokenization. Proceedings of the AAAI Conference on Artificial Intelligence, 2023, 37 (3): 3597- 3605.
doi: 10.1609/aaai.v37i3.25470
|
| 8 |
ROESCH M. Snort: lightweight intrusion detection for networks[C]//Proceedings of LISA'99. New York, USA: ACM Press, 1999: 229-238.
|
| 9 |
RIVALDI O , MARPAUNG N L . Penerapan sistem keamanan jaringan menggunakan intrusion prevention system berbasis suricata. Jurnal Inovtek Polbeng Seri Informatika, 2023, 8 (1): 141- 153.
doi: 10.35314/isi.v8i1.3269
|
| 10 |
FLORES J A M . Breve análisis comparativo de Snort y Suricata. Investigación y Ciencia Aplicada ala Ingeniería, 2023, 6 (37): 61- 66.
|
| 11 |
ALQAHTANI H, SARKER I H, KALIM A, et al. Cyber intrusion detection using machine learning classification techniques[C]//Proceedings of International Conference on Computing Science, Communication and Security. Singapore: Springer Singapore, 2020: 121-131.
|
| 12 |
|
| 13 |
ALMUTHANNA A, MAFFEIS S. EarlyCrow: detecting APT malware command and control over HTTP(S) using contextual summaries[C]//Proceedings of International Conference on Information Security. Berlin, Germany: Springer, 2022: 1-10.
|
| 14 |
DU Y , ZHANG S B , WAN G G , et al. RRCNN: request response-based convolutional neural network for ICS network traffic anomaly detection. Computers, Materials & Continua, 2023, 75 (3): 5743- 5759.
|
| 15 |
ELSAYED M S, LE-KHAC N A, JAHROMI H Z, et al. A hybrid CNN-LSTM based approach for anomaly detection systems in SDNs[C]//Proceedings of the 16th International Conference on Availability, Reliability and Security. New York, USA: ACM Press, 2021: 17-20.
|
| 16 |
ZAIDI S S A , ANSARI M S , ASLAM A , et al. A survey of modern deep learning based object detection models. Digital Signal Processing, 2022, 126, 103514.
doi: 10.1016/j.dsp.2022.103514
|
| 17 |
MUTALIB N H A , SABRI A Q M , WAHAB A W A , et al. Explainable deep learning approach for advanced persistent threats (APTs) detection in cybersecurity: a review. Artificial Intelligence Review, 2024, 57 (11): 297.
doi: 10.1007/s10462-024-10890-4
|
| 18 |
LIU J , YAN J J , JIANG J , et al. TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network. Cybersecurity, 2022, 5 (1): 8.
doi: 10.1186/s42400-022-00110-3
|
| 19 |
WANG X R, LIU R S, YANG J, et al. Cyber threat intelligence entity extraction based on deep learning and field knowledge engineering[C]//Proceedings of the IEEE 25th International Conference on Computer Supported Cooperative Work in Design. Hangzhou, China: IEEE Press, 2022: 406-413.
|
| 20 |
ZIEMS N, WU S E. Security vulnerability detection using deep learning natural language processing[C]//Proceedings of the IEEE Conference on Computer Communications Workshops. Vancouver, Canada: IEEE Press, 2021: 1-6.
|
| 21 |
UDDIN M A, SARKER I H. An explainable transformer-based model for phishing email detection: a large language model approach[EB/OL]. [2024-05-10]. http://arxiv.org/pdf/2402.13871.
|
| 22 |
KENTON J D M W C, TOUTANOVA L K. BERT: pre-training of deep bidirectional transformers for language understanding[C]//Proceedings of NAACL-HLT. Washington D. C., USA: IEEE Press, 2019: 2.
|
| 23 |
|
| 24 |
杜林, 许传淇. 基于BERT的漏洞文本特征分类技术研究. 信息安全研究, 2023, 9 (7): 687- 692.
|
|
DU L , XU C . Research on vulnerability text feature classification technology based on BERT. Journal of Information Security Research, 2023, 9 (7): 687- 692.
|
| 25 |
LIN X J, XIONG G, GOU G P, et al. ET-BERT: a contextualized datagram representation with pre-training transformers for encrypted traffic classification[C]//Proceedings of the ACM Web Conference 2022. New York, USA: ACM Press, 2022: 633-642.
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
SHI W C , SUN H M . DeepBot: a time-based botnet detection with deep learning. Soft Computing, 2020, 24 (21): 16605- 16616.
doi: 10.1007/s00500-020-04963-z
|
| 30 |
ELMAN J . Finding structure in time. Cognitive Science, 1990, 14 (2): 179- 211.
doi: 10.1207/s15516709cog1402_1
|
| 31 |
HOCHREITER S , SCHMIDHUBER J . Long short-term memory. Neural Computation, 1997, 9 (8): 1735- 1780.
doi: 10.1162/neco.1997.9.8.1735
|
| 32 |
CHO K. Learning phrase representations using RNN encoder-decoder for statistical machine translation[EB/OL]. [2024-05-10]. https://arxiv.org/abs/1406.1078.
|
| 33 |
SCHUSTER M , PALIWAL K K . Bidirectional recurrent neural networks. IEEE Transactions on Signal Processing, 1997, 45 (11): 2673- 2681.
doi: 10.1109/78.650093
|
| 34 |
GRAVES A, MOHAMED A R, HINTON G. Speech recognition with deep recurrent neural networks[C]//Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing. Vancouver, Canada: IEEE Press, 2013: 6645-6649.
|
| 35 |
|