共 13 条
- [1] Moorthy M., Sathiyabama S., A study of intrusion detection using data mining, International Conference on Advances in Engineering, Science and Management, pp. 8-15, (2012)
- [2] Hu C., Theory and Technology of Network Intrusion Detection, (2010)
- [3] Pietraszek T., Tanner A., Data mining and machine learning-towards reducing false positives in intrusion detection, Information Security Technical Report, 10, 3, pp. 169-183, (2005)
- [4] Tesfahun A., Bhaskari D.L., Intrusion detection using random forests classifier with SMOTE and feature reduction, International Conference on Cloud & Ubiquitous Computing & Emerging Technologies, pp. 127-132, (2014)
- [5] Li L., Yu Y., Bai S., Et al., Intrusion detection model based on double training technique, Transactions of Beijing Institute of Technology, 12, pp. 1246-1252, (2017)
- [6] Batista G.E.A.P.A., Prati R.C., Monard M.C., A study of the behavior of several methods for balancing machine learning training data, ACM SIGKDD Explorations Newsletter, 6, 1, pp. 20-29, (2004)
- [7] Chawla N.V., Bowyer K.W., Hall L.O., Et al., SMOTE: synthetic minority over-sampling technique, Journal of Artificial Intelligence Research, 16, 1, pp. 321-357, (2002)
- [8] Han H., Wang W.Y., Mao B.H., Borderline-SMOTE: a new over-sampling method in imbalanced data sets learning, International Conference on Advances in Intelligent Computing, pp. 878-887, (2005)
- [9] Wilson D.L., Asymptotic properties of nearest neighbor rules using edited data, IEEE Transactions on Systems Man & Cybernetics, SMC-2, 3, pp. 408-421, (2007)
- [10] Zhang X., Zeng H., Jia L., Research on intrusion detection data set KDD CUP99, Computer Engineering and Design, 31, 22, pp. 4809-4812, (2010)