NGHIÊN CỨU ỨNG DỤNG MỘT SỐ THUẬT TOÁN HỌC SÂU CHO BÀI TOÁN PHÁT HIỆN SỚM XÂM NHẬP BẤT THƯỜNG TRONG MẠNG
Thông tin bài báo
Ngày nhận bài: 08/03/23                Ngày hoàn thiện: 21/04/23                Ngày đăng: 31/08/23Tóm tắt
Từ khóa
Toàn văn:
PDFTài liệu tham khảo
[1] S. Naseer and Y. Saleem, “Enhanced Network Intrusion Detection using Deep Convolutional Neural Networks,” KSII Transactions on internet and information systems, vol. 12, no. 10, pp. 5159-5178, 2018.
[2] W. L. Al-Yaseen, Z. A. Othman, and M. Z. A. Nazri, “Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system,” Expert Syst. Appl., vol. 67, pp. 296–303, Jan. 2017.
[3] K. Alrawashdeh and C. Purdy, “Toward an Online Anomaly Intrusion Detection System Based on Deep Learning,” 15th IEEE International Conference on Machine Learning and Applications (ICMLA), USA, 2016, doi:10.1109/ICMLA.2016.0040
[4] V. K. Kanneganti, K. Swthi, and B. Brao, “A Novel Framework for NIDS through Fast kNN Classifier on CICIDS2017 Dataset,” International Journal of Recent Technology and Engineering, vol. 8, no. 5, pp. 2277-3878, 2020.
[5] J. Kim, N. Shin, S. Y. Jo, and S. H. Kim, “Method of intrusion detection using deep neural network,” in Proc. of IEEE International Conference on Big Data and Smart Computing (BigComp), 2017, pp. 313–316.
[6] R. A. R. Ashfaq, X. Z. Wang, J. Z. Huang, H. Abbas, and Y. L. He, “Fuzziness based semi-supervised learning approach for intrusion detection system,” Information Sciences, vol. 378, pp. 484–497, 2017, doi: 10.1016/j.ins.2016.04.019.
[7] E. Alhajjar, “Adversarial machine learning in Network Intrusion Detection Systems,” Expert Systems with Applications, vol. 186, pp. 1-10, 2021.
[8] K. Swathi and B. B. Rao, “Impact of PDS Based kNN Classifiers on Kyoto Dataset,” International Journal of RoughSets and Data Analysis (IJRSDA), vol. 6, no. 2, pp. 61-72, 2019, doi: 10.4018/IJRSDA.2019040105.
[9] B. Rao, “A Fast KNN Based Intrusion Detection System for Cloud Environment,” Jour of Adv Research in Dynamical & Control Systems, vol. 10, no. 7, pp. 1509 -1515, 2018.
[10] Y. Liao and R. V. Vemuri, “Use of K-Nearest Neighbor classifier for intrusion detection,” Computers & Security, vol. 21, no. 5, pp. 439-448, 2002.
[11] F. S. D. L. Filho, A. M. B. Junior, G. V. Solar, and L. F. Silveira, “Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning,” Security and Communication Networks, vol. 2019, pp. 1-15, 2019.
[12] J. Long, "TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest," Security and Communication Networks, vol. 1, pp. 1-9, 2018.
[13] A. Maraj, “Testing of network security systems through DoS attacks,” in 6th Mediterranean Conference on Embedded Computing (MECO), 2017, pp. 368-373, doi: 10.1109/MECO.2017.7977239.
[14] H. H. Le, “Studying a solution for early detection of DDoS attacks based on machine learning algorithms,” TNU Journal of Science and Technology, vol. 227, no. 11, pp. 137 - 144, 2022.
[15] H. H. Le, “Study technique to limit bandwidth spending from DDoS attacks,” Yersin Journal of Science - Yersin University, vol. 7, pp. 52-61, 2020.
[16] H. H. Le, “Improve network security system in Vietnam using reverse method,” TNU Journal of Science and Technology, vol. 225, no. 09, pp. 125-133, 2020.
[17] H. H. Le, “Study to applying Blockchain technology for preventing of spam email,” TNU - Journal of Science and Technology, vol. 208, no. 15, pp. 161-167, 2019.
[18] H. H. Le, “Combinning VLAN-Access List to enhance VLAN security efficient,” TNU Journal of Science and Technology, vol. 181, no. 05, pp. 143-149, 2018.
[19] H. H. Le, “Network design of IPv6 safety based on analysis, feature assessment of IPv6 protocol,” TNU Journal of Science and Technology, vol. 188, no. 12, pp. 85-91, 2018.
[20] H. H. Le, “Study to analyse, compare and evaluate the performance of Next General Firewalls: case of Palo Alto and Fortigate Firewall,” Vinh University Journal of Science (VUJS), vol. 51, no. 2A/2022, pp. 24-36, 2022.
DOI: https://doi.org/10.34238/tnu-jst.7494
Các bài báo tham chiếu
- Hiện tại không có bài báo tham chiếu