|
[1] Goebel, Jan, and Thorsten Holz. "Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation." HotBots 7 (2007): 8-8. [2] Alzahrani, Abdullah J., and Ali A. Ghorbani. "Real-time signature-based detection approach for sms botnet." 2015 13th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2015. [3] Denning, Dorothy E. "An intrusion-detection model." IEEE Transactions on software engineering 2 (1987): 222-232. [4] Ye, Nong, et al. "Multivariate statistical analysis of audit trails for host-based intrusion detection." IEEE Transactions on computers 51.7 (2002): 810-820. [5] Langin, Chet, et al. "A self-organizing map and its modeling for discovering malignant network traffic." 2009 IEEE symposium on computational intelligence in Cyber Security. IEEE, 2009. [6] Anderson, James P. "Computer security threat monitoring and surveillance." Technical Report, James P. Anderson Company (1980). [7] Zhou, Huiyi, et al. "A method of improved CNN traffic classification." 2017 13th International Conference on Computational Intelligence and Security (CIS). IEEE, 2017. [8] Kim, Jihyun, et al. "Long short term memory recurrent neural network classifier for intrusion detection." 2016 International Conference on Platform Technology and Service (PlatCon). IEEE, 2016. [9] Zhang, Yong, et al. "Network Intrusion Detection: Based on Deep Hierarchical Network and Original Flow Data." IEEE Access 7 (2019): 37004-37016. [10] LeCun, Yann, et al. "Gradient-based learning applied to document recognition." Proceedings of the IEEE 86.11 (1998): 2278-2324. [11] CICIDS dataset, https://www.unb.ca/cic/datasets/ids-2017.html [12] CTU dataset, https://mcfp.weebly.com/the-ctu-13-dataset-a-labeled-dataset-with-botnet-normal-and-background-traffic.html [13] Garcia, Sebastian, et al. "An empirical comparison of botnet detection methods." computers & security 45 (2014): 100-123. [14] Wang, Kuochen, et al. "A fuzzy pattern-based filtering algorithm for botnet detection." Computer Networks 55.15 (2011): 3275-3286. [15] Oikarinen, Jarkko, and Darren Reed. "Internet relay chat protocol." (1993). [16] Yamauchi, Kazumasa, Yoshiaki Hori, and Kouichi Sakurai. "Detecting HTTP-based botnet based on characteristic of the C & C session using by SVM." 2013 Eighth Asia Joint Conference on Information Security. IEEE, 2013. [17] 胡鈞証, “具位置知覺之混合式P2P興趣分群系統,” 碩士論文, 國立中央大學資訊工程學系碩士班, 2007。 [18] Silva, Sérgio SC, et al. "Botnets: A survey." Computer Networks 57.2 (2013): 378-403. [19] Snort, https://www.snort.org/.https://zh.wikipedia.org/wiki/Snort [20] Gu, Guofei, et al. "Bothunter: Detecting malware infection through ids-driven dialog correlation." USENIX Security Symposium. Vol. 7. 2007. [21] Dagon, David. "Botnet detection and response." OARC workshop. Vol. 2005. 2005. [22] Cisco Netflow, http://www.cisco.com/c/en/us/products/ios nx os software/ios-netflow/index.html [23] Saad, Sherif, et al. "Detecting P2P botnets through network behavior analysis and machine learning." 2011 Ninth annual international conference on privacy, security and trust. IEEE, 2011. [24] McCulloch, Warren S., and Walter Pitts. "A logical calculus of the ideas immanent in nervous activity." The bulletin of mathematical biophysics 5.4 (1943): 115-133. [25] LeCun, Yann, et al. "Gradient-based learning applied to document recognition." Proceedings of the IEEE 86.11 (1998): 2278-2324. [26] Graves, Alex, Abdel-rahman Mohamed, and Geoffrey Hinton. "Speech recognition with deep recurrent neural networks." 2013 IEEE international conference on acoustics, speech and signal processing. IEEE, 2013. [27] Hochreiter, Sepp, and Jürgen Schmidhuber. "Long short-term memory." Neural computation 9.8 (1997): 1735-1780. [28] Zeiler, Matthew D., and Rob Fergus. "Visualizing and understanding convolutional networks." European conference on computer vision. Springer, Cham, 2014. [29] Zintgraf, Luisa M., et al. "Visualizing deep neural network decisions: Prediction difference analysis." arXiv preprint arXiv:1702.04595 (2017). [30] Anderson, James P. "Computer security threat monitoring and surveillance." Technical Report, James P. Anderson Company (1980). [31] Xingjian, S. H. I., et al. "Convolutional LSTM network: A machine learning approach for precipitation nowcasting." Advances in neural information processing systems. 2015.
|