1 |
中国互联网络信息中心.第51 次中国互联网络发展状况统计报告[EB/OL]. [2023-03-24]. .
|
2 |
腾讯安全. 2021年全球DDoS威胁报告:DDoS威胁成犯罪团伙首选勒索手段[EB/OL]. [2022-01-19]. .
|
3 |
余杰.基于TensorFlow和卷积神经网络的网络恶意流量检测[C]// 中国电机工程学会电力通信专业委员会第十二届学术会议.电力通信技术研究及应用. 北京:人民邮电出版社, 2019:406-410.
|
4 |
李佳,云晓春,李书豪,等.基于混合结构深度神经网络的 HTTP 恶意流量检测方法[J].通信学报,2019,40(1):24-33.
|
5 |
董书琴,张斌.基于深度特征学习的网络流量异常检测方法[J].电子与信息学报, 2020, 42(3): 695-703. 10.11999/JEIT190266
|
6 |
李慧慧,张士庚,宋虹,等.结合多特征识别的恶意加密流量检测方法[J].信息安全学报, 2021, 6(2): 129-142. 10.19363/J.cnki.cn10-1380/tn.2021.03.09
|
7 |
包阳敏.网络恶意流量检测技术研究[D].哈尔滨:哈尔滨工程大学, 2021: 1-10.
|
8 |
赵忠斌,蔡满春,芦天亮.融合多头注意力机制的网络恶意流量检测[J].数据与计算发展前沿, 2022, 4(5): 60-67.
|
9 |
崔弘,赵双,张广胜,等.基于机器学习的移动代理应用流量识别方法[J].计算机工程与科学,2022,44(4):654-664. 10.3969/j.issn.1007-130X.2022.04.009
|
10 |
杨杰,张东月,周丽华,等.基于网格耦合的数据流异常检测[J].计算机工程与科学,2020,42(1):25-35. 10.3969/j.issn.1007-130X.2020.01.004
|
11 |
李源,王运鹏,李涛,等.基于多特征融合的Webshell恶意流量检测方法[J].网络与信息安全学报, 2021, 7(6): 143-154. 10.11959/j.issn.2096-109x.2021103
|
12 |
陈铁明,金成强,吕明琪,等.基于样本增强的网络恶意流量智能检测方法[J].通信学报, 2020, 41(6): 128-138. 10.11959/j.issn.1000-436x.2020122
|
13 |
王伟.基于深度学习的网络流量分类及异常检测方法研究[D].合肥:中国科学技术大学, 2018: 2-10.
|
14 |
王一丰,郭渊博,陈庆礼,等.基于对比学习的细粒度未知恶意流量分类方法[J].通信学报, 2022, 43(10): 12-25.
|
15 |
邹福泰,俞汤达,许文亮.基于隐马尔可夫模型的加密恶意流量检测[J].软件学报,2022,33(7):2683-2698.
|
16 |
CHAPANERI R, SHAH S. Detection of malicious network traffic using convolutional neural networks[C]// Proceedings of the 2019 10th International Conference on Computing, Communication and Networking Technologies. Piscataway: IEEE, 2019: 1-6. 10.1109/icccnt45670.2019.8944814
|
17 |
GAO M, MA L, LIU H, et al. Malicious network traffic detection based on deep neural networks and association analysis[J]. Sensors, 2020, 20(5): 1452. 10.3390/s20051452
|
18 |
WANG B, SU Y, ZHANG M, et al. A deep hierarchical network for packet-level malicious traffic detection[J]. IEEE Access, 2020, 8: 201728-201740. 10.1109/access.2020.3035967
|
19 |
THAPA K N K, DURAIPANDIAN N. Malicious traffic classification using Long Short-Term Memory (LSTM) model[J]. Wireless Personal Communications, 2021, 119: 2707-2724. 10.1007/s11277-021-08359-6
|
20 |
WANG Z, FOK K W, THING V L L. Machine learning for encrypted malicious traffic detection: approaches, datasets and comparative study[J]. Computers & Security, 2022, 113: 102-542. 10.1016/j.cose.2021.102542
|
21 |
LIU J, WANG L, HU W, et al. Spatial-temporal feature with dual-attention mechanism for encrypted malicious traffic detection[J]. Security and Communication Networks, 2023, 2023. 10.1155/2023/7117863
|
22 |
HWANG R H, PENG M C, NGUYEN V L, et al. An LSTM-based deep learning approach for classifying malicious traffic at the packet level[J]. Applied Sciences, 2019, 9(16): 3414. 10.3390/app9163414
|
23 |
MARÍN G, CAASAS P, CAPDEHOURAT G. DeepMAL — deep learning models for malware traffic detection and classification[C/OL]// Proceedings of the 3rd International Data Science Conference on Data Science — Analytics and Applications. Berlin: Springer, 2021: 105-112. 10.1007/978-3-658-32182-6_16
|
24 |
LIN K, XU X, XIAO F. MFFusion: a multi-level features fusion model for malicious traffic detection based on deep learning[J]. Computer Networks, 2022, 202: 108-658. 10.1016/j.comnet.2021.108658
|
25 |
LI C, WANG J, YE X. Using a recurrent neural network and restricted Boltzmann machines for malicious traffic detection[J]. NeuroQuantology, 2018, 16(5): 823-831. 10.14704/nq.2018.16.5.1391
|
26 |
邹源,张甲,江滨.基于LSTM循环神经网络的恶意加密流量检测[J].计算机应用与软件,2020,37(2):308-312. 10.3969/j.issn.1000-386x.2020.02.048
|
27 |
杨彦召,朱程威,仇晶,等.基于TextCNN的加密恶意流量检测方法[J].广州大学学报(自然科学版),2022,21(1):1-9.
|
28 |
SWEKE R, WILDE F, MEYER J, et al. Stochastic gradient descent for hybrid quantum-classical optimization[J]. Quantum, 2020, 4: 3-14. 10.22331/q-2020-08-31-314
|
29 |
吕帅.基于多特征多模型的恶意代码组织分类方法[D].北京:北京交通大学,2023: 3-10.
|
30 |
赵静,李俊,龙春,等.基于集成SVM和Bagging的未知恶意流量检测[J].计算机系统应用,2022,31(10):51-59.
|
31 |
罗文.基于改进DCGAN的恶意流量检测与分类方法研究[D].衡阳:南华大学,2022: 4-10.
|
32 |
霍跃华,赵法起.基于Stacking与多特征融合的加密恶意流量检测[J].计算机工程,2023,49(5):165-172.
|