PDF下载 分享
[1]詹鸿辉,程仲汉.基于卷积神经网络的异常流量鉴别方法[J].成都信息工程大学学报,2023,38(06):668-672.[doi:10.16836/j.cnki.jcuit.2023.06.008]
 ZHAN Honghui,CHENG Zhonghan.Identification Method of Abnormal Traffic based on Convolution Neural Network[J].Journal of Chengdu University of Information Technology,2023,38(06):668-672.[doi:10.16836/j.cnki.jcuit.2023.06.008]
点击复制

基于卷积神经网络的异常流量鉴别方法

参考文献/References:

[1] 陈晨,刘曙,王艺菲,等.基于PSOGWO-SVM的网络入侵检测方法[J].空军工程大学学报(自然科学版),2022,23(2):97-105.
[2] 付子爔,徐洋,吴招娣,等.基于增量学习的SVM-KNN网络入侵检测方法[J].计算机工程,2020,46(4):115-122.
[3] Logeswari G,Bose S,Anitha T.An Intrusion Detection System for SDN Using Machine Learning[J].Intelligent Automation & Soft Computing,2023,35(1):868-880.
[4] Duo Ruifeng,Nie Xiaobo,Yang Ning, et al. Anomaly Detection and Attack Classification for Train Real-Time Ethernet[J]. IEEE ACCESS,2021,9:22528-22541.
[5] Yin Chuanlong,Zhu Yuefei,Fei Jinlong, et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks[J]. IEEE Access,2017,5:21954-21961.
[6] 董卫宇,李海涛,王瑞敏,等.基于堆叠卷积注意力的网络流量异常检测模型[J].计算机工程,2022,48(9):12-19.
[7] 曹卫东,许志香,王静.基于深度生成模型的半监督入侵检测算法[J].计算机科学,2019,46(3):197-201.
[8] 连鸿飞,张浩,郭文忠.一种数据增强与混合神经网络的异常流量检测[J].小型微型计算机系统,2020,41(4):786-793.
[9] Tavallaee M,Bagheri E,Lu W,et al.A detailed analysis of the KDD CUP 99 data set[C].IEEE symposium on computational intelligence for security an d defense applications.Ieee,2009:1-6.
[10] Alex Krizhevsky,Ilya Sutskever,Geoffrey E.Hinton.ImageNet classification with deep convolutional neural networks[J].Communications of the ACM,2017,60(6):84-89.
[11] Glorot X,Bengio Y.Understanding the difficulty of training deep feedforward neural networks[C].Proceedings of the thirteenth international conference on artificial intelligence and statistics.JMLR Workshop and Conference Proceedings,2010:249-256.
[12] Biggio B,Corona I,Fumera G,et al.Bagging classifiers for fighting poisoning attacks in adversarial classification tasks[C].International workshop on multiple classifier systems.Springer,Berlin,Heidelberg,2011:350-359.
[13] 张昊,张小雨,张振友,等.基于深度学习的入侵检测模型综述[J].计算机工程与应用,2022,58(6):17-28.
[14] Goodfellow I,Bengio Y,Courville A.Deep learning[M].MIT press,2016:90-106.
[15] Krizhevsky A,Sutskever I,Hinton G.Imagenet classification with deep convolutional networks[C].Proceedings of the Conference Neural Information Processing Systems(NIPS).1097:4875-4884.
[16] 纪守领,杜天宇,邓水光,等.深度学习模型鲁棒性研究综述[J].计算机学报,2022,45(1):190-206.
[17] McHugh J.Testing intrusion detection systems:a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory[J].ACM Transactions on Information and System Security(TISSEC),2000,3(4):262-294.

备注/Memo

收稿日期:2022-11-08
基金项目:福建省中青年教师教育科研资助项目(JAT200379)

更新日期/Last Update: 2023-12-10