[1]
|
Chen, P., Desmet, L. and Huygens, C. (2014) A Study on Advanced Persistent Threats. Lecture Notes in Computer Science, 8735, 63-72. https://doi.org/10.1007/978-3-662-44885-4_5
|
[2]
|
Virvilis, N. and Gritzalis, D. (2013) The Big Four—What We Did Wrong in Advanced Persistent Threat Detection? IEEE Eighth International Conference on Availability, Reliability and Security, Regensburg, 2-6 September 2013, 248-254. https://doi.org/10.1109/ARES.2013.32
|
[3]
|
Yang, G., Tian, Z. and Duan, W. (2015) The Prevent of Advanced Persistent Threat. Journal of Chemical & Pharmaceutical Research, 6, 572-576.
|
[4]
|
Giura, P. and Wang, W. (2013) Using Large Scale Distributed Computing to Unveil Advanced Persistent Threats. Science, 1, 93-105.
|
[5]
|
马琳. 基于大数据的APT攻击方法和检测方法[J]. 计算机光盘软件与应用, 2014(10): 91.
|
[6]
|
付钰, 李洪成, 吴晓平, 等. 基于大数据分析的APT攻击检测研究综述[J]. 通信学报, 2015, 36(11): 1-14.
|
[7]
|
Leung, K. and Leckie, C. (2007) Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters. Twenty-Eighth Australasian Computer Science Conference on Computer Science, Newcastle, January 2005, 333-342.
|
[8]
|
郑黎明, 邹鹏, 韩伟红, 等. 基于多维熵值分类的骨干网流量异常检测研究[J]. 计算机研究与发展, 2012, 49(9): 1972-1981.
|
[9]
|
李柏生, 林亚平, 鄢喜爱. 基于朴素贝叶斯网络的入侵检测分析[J]. 网络安全技术与应用, 2007(9): 23-25.
|
[10]
|
史长琼, 王大卫, 黄辉, 等. 基于粗糙集与小生境GA的网络入侵规则提取[J]. 计算机工程与应用, 2009, 45(5): 110-112.
|
[11]
|
Erman, J., Mahanti, A., Arlitt, M., et al. (2007) Semi-Supervised Network Traffic Classification. ACM SIGMETRICS Performance Evaluation Review, 35, 369-370.
|
[12]
|
Ashfaq, R.A.R., Wang, X.Z., Huang, J.Z., et al. (2016) Fuzziness Based Semi-Supervised Learning Approach for Intrusion Detection System. Information Sciences, 378, 484-497.
|
[13]
|
Yasami, Y. and Mozaffari, S.P. (2010) A Novel Unsupervised Classification Approach for Network Anomaly Detection by k-Means Clustering and ID3 Decision Tree Learning Methods. The Journal of Supercomputing, 53, 231-245.
https://doi.org/10.1007/s11227-009-0338-x
|
[14]
|
Salama, M.A., Eid, H.F., Ramadan, R.A., et al. (2011) Hybrid Intelligent Intrusion Detection Scheme. In: Gaspar-Cunha, A., Takahashi, R., Schaefer, G. and Costa, L., Eds., Soft Computing in Industrial Applications. Advances in Intelligent and Soft Computing, Vol. 96, Springer, Berlin, Heidelberg, 293-303.
|
[15]
|
Rubinstein, B.I.P., Nelson, B., Huang, L., et al. (2009) Stealthy Poisoning Attacks on PCA-Based Anomaly Detectors. ACM SIGMETRICS Performance Evaluation Review, 37, 73-74. https://doi.org/10.1145/1639562.1639592
|
[16]
|
Hinton, G.E. and Salakhutdinov, R.R. (2006) Reducing the Dimensionality of Data with Neural Networks. Science, 313, 504-507. https://doi.org/10.1126/science.1127647
|
[17]
|
Hinton, G.E., Osindero, S. and Teh, Y.-W. (2006) A Fast Learning Algorithm for Deep Belief Nets. Neural Computation, 18, 1527-1554. https://doi.org/10.1162/neco.2006.18.7.1527
|
[18]
|
Liu, Y., Zhou, S. and Chen, Q. (2011) Discriminative Deep Belief Networks for Visual Data Classification. Pattern Recognition, 44, 2287-2296. https://doi.org/10.1016/j.patcog.2010.12.012
|
[19]
|
Hinton, G.E. (2002) Training Products of Experts by Minimizing Contrastive Divergence. Neural Computation, 14, 1771-1800. https://doi.org/10.1162/089976602760128018
|
[20]
|
阜艳, 李霆, 黄日辉, 等. 一种改进的支持向量数据描述算法[J]. 五邑大学学报(自然科学版), 2008, 22(2): 52-56.
|
[21]
|
Larochelle, H., Bengio, Y., Louradour, J. and Lamblin, P. (2009) Exploring Strategies for Training Deep Neural Networks. Journal of Machine Learning Research, 10, 1-40.
|
[22]
|
张新有, 曾华燊, 贾磊. 入侵检测数据集KDD CUP99研究[J]. 计算机工程与设计, 2010, 31(22): 4809-4812.
|
[23]
|
Neter, J., Kutner, M.H., Nachtsheim, C.J., et al. (1996) Applied Linear Statistical Models. Irwin, Chicago.
|
[24]
|
杨昆朋. 基于深度信念网络的入侵检测模型[J]. 现代计算机: 普及版, 2015(1):10-14.
|