共 37 条
- [1] Yu L, Chen L, Dong J, Et al., Detecting malicious Web requests using an enhanced TextCNN, Proceedings of the 2020 IEEE Annual International Computer Software and Applications Conference(COMPSAC), pp. 768-777, (2020)
- [2] Ji Tian-Tian, Fang Bin-Xing, Cui Xiang, Et al., Research on deep learning-powered malware attack and defense techniques, Chinese Journal of Computers, 44, 4, pp. 669-695, (2021)
- [3] Luo B, Xia J., A novel intrusion detection system based on feature generation with visualization strategy, Expert Systems with Applications, 41, 9, pp. 4139-4147, (2014)
- [4] Sperotto A, Schaffrath G, Sadre R, Et al., An overview of IP flow-based intrusion detection, IEEE Communications Surveys and Tutorials, 12, 3, pp. 343-356, (2010)
- [5] Denning D E., An intrusion-detection model, IEEE Transactions on Software Engineering, 13, 2, pp. 222-232, (1987)
- [6] Ma J, Saul L K, Savage S, Et al., Identifying suspicious URLs: An application of large-scale online learning, Proceedings of the 26th International Conference on Machine Learning(ICML), pp. 681-688, (2009)
- [7] Pan Feng, Ding Yun-Fei, Wang Wei-Nong, Anomaly detection techniques based on statistics, Journal of Shanghai Jiaotong University, 38, pp. 204-207, (2004)
- [8] Borders K, Springer J, Burnside M., Chimera: A declarative language for streaming network traffic analysis, Proceedings of the 21st USENIX Security Symposium, pp. 365-379, (2012)
- [9] Li H, Hu H, Gu G, Et al., vNIDS: Towards elastic security with safe and efficient virtualization of network intrusion detection systems, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security(CCS), pp. 17-34, (2018)
- [10] Abbes T, Bouhoula A, Rusinowitch M., Efficient decision tree for protocol analysis in intrusion detection, International Journal of Security and Networks, 5, 4, pp. 220-235, (2010)