[1] 杨雅辉,黄海珍,沈晴霓,等.基于增量式GHSOM神经网络模型的入侵检测研究[J].计算机学报, 2014, 37(5): 1216-1224.(YANG Y H, HUANG H Z, SHEN Q N, et al. Research on intrusion detection based on incremental GHSOM [J]. Chinese Journal of Computers, 2014, 37(5): 1216-1224.) [2] SCHAELICKE L, WHEELER K, FREELAND C. SPANIDS: a scalable network intrusion detection load balancer [C] //CF '05: Proceedings of the 2nd Conference on Computing Frontiers. New York: ACM, 2005:315- 322. [3] 史志才,夏永祥.高速网络环境下的入侵检测技术研究综述[J].计算机应用研究,2010,27(5):1606-1610.(SHI Z C, XIA Y X. Survey on intrusion detection techniques for high-speed networks [J]. Application Research of Computers, 2010, 27(5): 1606-1610.) [4] IHEAGWARA C, BLYTH A, SINGHAL M. A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment [J]. Journal of Computer Security, 2003, 11(1): 1-33. [5] 唐谦,张大方.入侵检测中模式匹配算法的性能分析[J].计算机工程与应用, 2005, 41(17): 136-138.(TANG Q, ZHANG D F. Performance analysis of pattern matching algorithms for intrusion detection [J]. Computer Engineering and Applications, 2005, 41(17): 136-138.) [6] PATCHA A, PARK J M. An overview of anomaly detection techniques: existing solutions and latest technological trends [J]. Computer Networks, 2007, 51(12): 3448-3470. [7] CHAWLA N V, BOWYER K W, HALL L O, et al. SMOTE: synthetic minority over-sampling technique [J]. Journal of Artificial Intelligence Research, 2002, 16(1): 321-357. [8] 林舒杨,李翠华,江弋,等.不平衡数据的降采样方法研究[J].计算机研究与发展,2011,48(Suppl.):47-53.(LIN S Y, LI C H, JIANG Y, et al. Under-sampling method research in class-imbalanced data [J]. Journal of Computer Research and Development, 2011, 48(Suppl.): 47-53.) [9] DAS A, NGUYEN D, ZAMBRENO J, et al. An FPGA-based network intrusion detection architecture [J]. IEEE Transactions on Information Forensics and Security, 2008, 3(1): 118-132. [10] 谷凤娜,张志斌,王丽宏.基于分布式入侵检测系统的负载均衡算法的比较[J].计算机科学,2008,35(11):63-73.(GU F N, ZHANG Z B, WANG L H. Comparison among load balancing algorithms based on distributed NIDS [J]. Computer Science, 2008, 35(11): 63-66.) [11] 曾茂林,文志诚,杨润,等.一种提高网络入侵检测系统检测率的方法[J].湖南工业大学学报,2011,25(2):62-66.(ZENG M L, WEN Z H, YANG R, et al. A method to improve the accuracy of network intrusion detection system [J]. Journal of Hunan University of Technology, 2011, 25(2): 62-66.) [12] 傅蓉蓉,郑康锋,芦天亮,等.基于危险理论的无线传感器网络入侵检测模型[J].通信学报,2012,33(9):31-37.(FU R R, ZHENG K F, LU T L, et al. Danger theory inspired intrusion detection model for wireless sensor networks[J]. Journal on Communications, 2012, 33(9): 31-37.) [13] 张文兴,樊捷杰.基于KKT和超球结构的增量SVM算法的云架构入侵检测系统[J].计算机应用,2015,35(10):2886-2890.(ZHANG W X, FAN J J. Cloud architecture intrusion detection system based on KKT condition and hyper-sphere incremental SVM algorithm[J]. Journal of Computer Applications, 2015, 35(10): 2886-2890.) [14] 程建,张明清,刘小虎,等.基于人工免疫的分布式入侵检测模型[J].计算机应用,2014,34(1):86-89.(CHENG J, ZHANG M Q, LIU X H, et al. Distributed intrusion detection model based on artificial immune[J]. Journal of Computer Applications, 2014,34(1):86-89.) |