[1] 焦宏宇. 基于Openstack的新型蜜场系统[D]. 南京:南京邮电大学, 2018:2-3. [2] Liao H J, Lin C H R, Lin Y C, et al. Intrusion detection system:a comprehensive review[J]. Journal of Network and Computer Applications, 2013, 36(1):16-24. [3] Wang Wei, Sheng Yiqiang, Wang Jinlin, et al. HAST-IDS:learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection[J]. IEEE Access, 2017, 6:1792-1806. [4] Zhang Fengli, Wang Dan. An effective feature selection approach for network intrusion detection[C]//2013 IEEE Eighth International Conference on Networking, Architecture and Storage. Piscataway:IEEE, 2013:307-311. [5] Hubballi N, Suryanarayanan V. False alarm minimization techniques in signature-based intrusion detection systems:a survey[J]. Computer Communications, 2014, 49:1-17. [6] Ma Tao, Wang Fen, Cheng Jianjun, et al. A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks[J]. Sensors, 2016, 16(10):1701. [7] Javaid A, Niyaz Q, Sun Weiqing, et al. A deep learning approach for network intrusion detection system[J]. EAI Endorsed Transactions on Security and Safety, 2016, 3(9):e2. [8] Tan Zhiyuan, Jamdagni A, He Xiangjian, et al. Detection of denial-of-service attacks based on computer vision techniques[J]. IEEE Transactions on Computers, 2014, 64(9):2519-2533. [9] Torres P, Catania C, Garcia S, et al. An analysis of recurrent neural networks for botnet detection behavior[C]//2016 IEEE Biennial Congress of Argentina (ARGENCON). Piscataway:IEEE, 2016:1-6. [10] Zhang Jianwu, Ling Yu, Fu Xingbing, et al. Model of the intrusion detection system based on the integration of spatial-temporal features[J]. Computers & Security, 2020, 89:101681. [11] Lotfollahi M, Siavoshani M J, Zade R S H, et al. Deep packet:a novel approach for encrypted traffic classification using deep learning[J]. Soft Computing, 2020, 24(3):1999-2012. [12] Yao Zhongjiang, Ge Jingguo, Wu Yulei, et al. Encrypted traffic classification based on Gaussian mixture models and hidden Markov models[J]. Journal of Network and Computer Applications, 2020, 166:102711. [13] Iliofotou M, Kim H, Faloutsos M, et al. Graption:a graph-based P2P traffic classification framework for the internet backbone[J]. Computer Networks, 2011, 55(8):1909-1920. [14] Moore A W, Papagiannaki K. Toward the accurate identification of network applications[C]//International Workshop on Passive and Active Network Measurement. Berlin:Springer, 2005:41-54. [15] Li Ao, Qin Zhou, Liu Runshi, et al. Spam review detection with graph convolutional networks[C]//28th ACM International Conference on Information and Knowledge Management. New York:ACM, 2019:2703-2711. [16] Vaswani A, Shazeer N, Parmar N, et al. Attention is all you need[C]//Advances in Neural Information Processing Systems. New York:Curran Associates, 2017:5998-6008. [17] Lippmann R, Cunningham R K, Fried D J, et al. Results of the DARPA 1998 offline intrusion detection evaluation[C]//Recent Advances in Intrusion Detection. Berlin:Springer, 1999:829-835. [18] Shiravi A, Shiravi H, Tavallaee M, et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection[J]. Computers & Secu-rity, 2012, 31(3):357-374. [19] Xu Xin. Adaptive intrusion detection based on machine learning:feature extraction, classifier construction and sequential pattern prediction[J]. International Journal of Web Services Practices, 2006, 2(1-2):49-58. [20] Farid D M, Harbi N, Rahman M Z. Combining naive Bayes and decision tree for adaptive intrusion detection[J]. International Journal of Network Security & Its Applications, 2010, 2(2):12-25 [21] Wang Wei, Zhu Ming, Wang Jinlin, et al. End-to-end encrypted traffic classification with one-dimensional convolution neural networks[C]//2017 IEEE International Conference on Intelligence and Security Informatics(ISI). Piscataway:IEEE, 2017:43-48. |