参考文献
[1]张玲,白中英,罗守山,等.基于粗糙集和人工免疫的集成入侵检测模型[J].通信学报,2013,34(9):166-176.
[2]Li M.Change Trend of Averaged Hurst Parameter of Traffic Under DDOS Flood Attacks[J].Computers & Security,2006,25(3):213-220.
[3]Wang W,Guyet T,Quiniou R,et al.Autonomic Intrusion Detection:Adaptively Detecting Anomalies over Unlabeled Audit Data Streams in Computer Networks[J].Knowledge-based Systems,2014,70:103-117.
[4]赵曦滨,井然哲,顾明.基于粗糙集的自适应入侵检测算法[J].清华大学学报(自然科学版),2008,48(7):1165-1168.
[5]唐成华,刘鹏程,汤申生,等.基于特征选择的模糊聚类异常入侵行为检测[J].计算机研究与发展,2015,52(3):718-728.
[6]Saxena H,Richariya V.Intrusion Detection in KDD99 Dataset Using SVM-PSO and Feature Reduction with Information Gain[J].International Journal of Computer Applications,2014,98(6):25-29.
[7]李丹丹,田春伟,李佰洋,等.基于子空间聚类的网络流量分类方法[J].哈尔滨理工大学学报,2015,20(2):63-68.
[8]Lin W C,Ke S W,Tsai C F.CANN:An Intrusion Detection System Based on Combining Cluster Centers and NearestNeighbors[J].Knowledge-based Systems,2015,78(1):13-21.
[9]Reynolds R G.An Introduction to Cultural Algori-thms[C]//Proceedings of the 3rd Annual Conference on Evolutionary Programming.San Diego,USA: World Scientific,1994:131-139.
[10]郭一楠,巩敦卫.双层进化交互式遗传算法的知识提取与利用[J].控制与决策,2007,22(12):1329-1334.
[11]Coello C A C,Becerra R L.Evolutionary Multiobjective Optimization Using a Cultural Algorithm[C]//Proceedings of IEEE Swarm Intelligence Symposium.Washington D.C.,USA:IEEE Press,2003:6-13.
[12]郭一楠,王辉,程建.自适应免疫克隆选择文化算法[J].电子学报,2010,38(4):966-972.
[13]Sengupta N,Sen J,Sil J,et al.Designing of On-line Intrusion Detection System Using Rough Set Theory and Q-learning Algorithm[J].Neurocomputing,2013,111(6):161-168.
[14]Lashin E F,Kozae A M,Khadra A A A,et al.Rough Set Theory for Topological Spaces[J].International Journal of Approximate Reasoning,2005,40(12):35-43.
[15]Chang R K C.Defending Against Flooding-based Distributed Denial-of-Service Attacks:A Tutorial[J].IEEE Communications Magazine,2002,40(10):42-51.
编辑刘冰索书志 |