[1] VINAYAKUMAR R,ALAZAB M,SOMAN K P,et al. Deep learning approach for intelligent intrusion detection system[J]. IEEE Access,2019,7:41525-41550. [2] KIM J,KIM J,THI THU H L,et al. Long short term memory recurrent neural network classifier for intrusion detection[C]//Proceedings of the 2016 International Conference on Platform Technology and Service. Piscataway:IEEE,2016:1-5. [3] LI Z,RIOS A L G,XU G,et al. Machine learning techniques for classifying network anomalies and intrusions[C]//Proceedings of the 2019 IEEE International Symposium on Circuits and Systems. Piscataway:IEEE,2019:1-5. [4] KIM J,SHIN Y,CHOI E. An intrusion detection model based on a convolutional neural network[J]. Journal of Multimedia Information System,2019,6(4):165-172. [5] GURUNG S,GHOSE M K,SUBEDI A. Deep learning approach on network intrusion detection system using NSL-KDD dataset[J]. International Journal of Computer Network and Information Security,2019,11(3):8-14. [6] ZONG B,SONG Q,MIN M R,et al. Deep autoencoding Gaussian mixture model for unsupervised anomaly detection[EB/OL].[2020-11-12]. https://openreview.net/pdf?id=BJJLHbb0-. [7] LUDWIG S A. Intrusion detection of multiple attack classes using a deep neural net ensemble[C]//Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence. Piscataway:IEEE,2017:1-7. [8] ESKIN E. Anomaly detection over noisy data using learned probability distributions[C]//Proceedings of the 17th International Conference on Machine Learning. San Francisco:Morgan Kaufmann Publishers Inc.,2000:255-262. [9] HOFFER E,AILON N. Deep metric learning using triplet network[C]//Proceedings of the 2015 International Workshop on SimilarityBased Pattern Recognition,LNCS 9370. Cham:Springer,2015:84-92. [10] FADLULLAH Z M,TANG F,MAO B,et al. State-of-the-art deep learning:evolving machine intelligence toward tomorrow's intelligent network traffic control systems[J]. IEEE Communications Surveys and Tutorials,2017,19(4):2432-2455. [11] SHYU M L,CHEN S C,SARINNAPAKORN K,et al. A novel anomaly detection scheme based on principal component classifier[EB/OL].[2020-11-12]. https://homepages.laas.fr/owe/METROSEC/DOC/FDM03.pdf. [12] HELLER KA,SVORE K M,KEROMYTIS A D,et al. One class support vector machines for detect anomalous windows registry accesses[EB/OL].[2020-11-12]. https://angelosk.github.io/Papers/ocsvm.pdf. [13] YANG Y,McLAUGHLIN K,LITTLER T,et al. Rule-based intrusion detection system for SCADA networks[C/OL]//Proceedings of the 2nd IET Renewable Power Generation Conference. Stevenage:IET,2013(2013-09-09)[2020-03-15]. https://digital-library.theiet.org/content/conferences/10.1049/cp.2013.1729. [14] 吴剑. 基于特征选择的无监督入侵检测方法[J]. 计算机工程与应用,2011,47(26):79-82.(WU J. Unsupervised intrusion detection based on feature selection[J]. Computer Engineering and Applications,2011,47(26):79-82.) [15] NOORBEHBAHANI F,FANIAN A,MOUSAVI R,et al. An incremental intrusion detection system using a new semisupervised stream classification method[J]. International Journal of Communication Systems,2017,30(4):No. e3002. [16] ZHU M,YE K,WANG Y,et al. A deep learning approach for network anomaly detection based on AMF-LSTM[C]//Proceedings of the 2018 IFIP International Conference on Network and Parallel Computing,LNCS 11276. Cham:Springer,2018:137-141. [17] YUAN F,CAO Y,SHANG Y,et al. Insider threat detection with deep neural network[C]//Proceedings of the 2018 International Conference on Computational Science, LNCS 10860. Cham:Springer,2018:43-54. [18] SAAUDI A, AL-IBADI Z, TONG Y, et al. Insider threats detection using CNN-LSTM model[C]//Proceedings of the 2018 International Conference on Computational Science and Computational Intelligence. Piscataway:IEEE,2018:94-99. [19] AGARWAL S,TYAGI A,USHA G. A deep neural network strategy to distinguish and avoid cyber-attacks[M]//DASH S S, LAKSHMI C, DAS S, et al. Artificial Intelligence and Evolutionary Computations in Engineering Systems. Singapore:Springer,2020:673-681. [20] USTINOVA E,LEMPITSKY V. Learning deep embeddings with histogram loss[C]//Proceedings of the 30th International Conference on Neural Information Processing Systems. Red Hook, NY:Curran Associates Inc.,2016:4177-4185. [21] SONG H O,JEGELKA S,RATHOD V,et al. Deep metric learning via facility location[C]//Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE,2017:2206-2214. [22] WANG X,HAN X,HUANG W,et al. Multi-similarity loss with general pair weighting for deep metric learning[C]//Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE,2019:5017-5025. [23] 孙岩, 吕世聘, 王秀坤, 等. 基于结构学习的KNN分类算法[J]. 计算机科学,2007,34(12):184-186,237.(SUN Y,LYU S P, WANG X K, et al. K-nearest neighbor algorithm based on learning structure[J]. Computer Science,2007,34(12):184-186,237.) [24] IOFFE S,SZEGEDY C. Batch normalization:accelerating deep network training by reducing internal covariate shift[EB/OL].[2020-08-12]. https://arxiv.org/pdf/1502.03167.pdf. [25] GE W,HUANG W,DONG D,et al. Deep metric learning with hierarchical triplet loss[C]//Proceedings of the 2018 European Conference on Computer Vision,LNCS 11210. Cham:Springer, 2018:2772-288. [26] SONG H O,XIANG Y,JEGELKA S,et al. Deep metric learning via lifted structured feature embedding[C]//Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE,2016:4004-4012. [27] KINGMA D P, BA J L. Adam:a method for stochastic optimization[EB/OL].[2020-08-12]. https://arxiv.org/pdf/1412.6980.pdf. [28] GLASS-VANDERLAN T R,IANNACONE M D,VINCENT M S, et al. A survey of intrusion detection systems leveraging host data[EB/OL].[2020-08-12]. https://arxiv.org/pdf/1805.06070.pdf. [29] ADEK R T,ULA M. A survey on the accuracy of machine learning techniques for intrusion and anomaly detection on public data sets[C]//Proceedings of the 2020 International Conference on Data Science,Artificial Intelligence,and Business Analytics. Piscataway:IEEE,2020:19-27. [30] CICFlowMeter[CP/OL].[2020-05-29]. https://www.unb.ca/cic/research/applications.html#CICFlowMeter. [31] HE K,SUN J. Convolutional neural networks at constrained time cost[C]//Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE,2015:5353-5360. |