|
[1]Trend Micro. (2022). Trend Micro. "Defending The Expanding Attack Surface: Trend Micro 2022 midyear cybersecurity report. " Access on August 10, 2023, at www.trendmicro.com/zh_tw/security-intelligence/threat-report.html?modal=64964d. [2]S. Sahu and B. M. Mehtre, "Network intrusion detection system using J48 Decision Tree," 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Kochi, India, 2015, pp. 2023-2026. [3]S. Waskle, L. Parashar and U. Singh, "Intrusion Detection System Using PCA with Random Forest Approach," 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2020, pp. 803-808. [4]Z. Muda, W. Yassin, M. N. Sulaiman and N. I. Udzir, "Intrusion detection based on K-Means clustering and Naïve Bayes classification," 2011 7th International Conference on Information Technology in Asia, Sarawak, Malaysia, 2011, pp. 1-6. [5]M. V. Kotpalliwar and R. Wajgi, "Classification of Attacks Using Support Vector Machine (SVM) on KDDCUP'99 IDS Database," 2015 Fifth International Conference on Communication Systems and Network Technologies, Gwalior, India, 2015. [6]B. Subba, S. Biswas and S. Karmakar, "Intrusion Detection Systems using Linear Discriminant Analysis and Logistic Regression," 2015 Annual IEEE India Conference (INDICON), New Delhi, India, 2015, pp. 1-6. [7]S. Dhaliwal, A.-A. Nahid, and R. Abbas, "Effective intrusion detection system using XGBoost," Information, vol. 9, no. 7, p. 149, Jun. 2018. [8]H. Jiang, Z. He, G. Ye and H. Zhang, "Network Intrusion Detection Based on PSO-Xgboost Model," in IEEE Access, vol. 8, pp. 58392-58401, 2020. [9]W. Elmasry, A. Akbulut, and A. H. Zaim, "Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic," Comput. Networks, vol. 168, 2020. [10]A. S. Eesa, Z. Orman, and A. M. A. Brifcani, "A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems," Expert Syst. Appl., vol. 42, no. 5, pp. 2670–2679, Apr. 2015. [11]H. Peng, C. Ying, S. Tan, B. Hu and Z. Sun, "An Improved Feature Selection Algorithm Based on Ant Colony Optimization," in IEEE Access, vol. 6, pp. 69203-69209, 2018. [12]H.-P. Chiang, Y.-H. Chou, C.-H. Chiu, S.-Y. Kuo, and Y.-M. Huang, "A quantum-inspired Tabu search algorithm for solving combinatorial optimization problems," Soft Comput., vol. 18, no. 9, pp. 1771–1781, 2014. [13]W. -L. Yeoh, Y. -J. Jhang, S. -Y. Kuo and Y. -H. Chou, "Automatic Stock Trading System Combined with Short Selling Using Moving Average and GQTS Algorithm," 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Miyazaki, Japan, 2018, pp. 1570-1575. [14]S. Mabu, C. Chen, N. Lu, K. Shimada and K. Hirasawa, "An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming," in IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 41, no. 1, pp. 130-139, Jan. 2011. [15]B. A. Tama, M. Comuzzi and K. -H. Rhee, "TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System," in IEEE Access, vol. 7, pp. 94497-94507, 2019. [16]M. Tavallaee, E. Bagheri, W. Lu and A. A. Ghorbani, "A detailed analysis of the KDD CUP 99 data set," 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, 2009, pp. 1-6. [17]N. Moustafa and J. Slay, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, ACT, Australia, 2015, pp. 1-6. [18]Y. Ding and Y. Zhai, "Intrusion detection system for NSL-KDD dataset using convolutional neural networks," in Proc. 2nd Int. Conf. Comput. Sci. Artif. Intell. (CSAI), 2018, pp. 81–85. [19]G. Mahalakshmi et al., "Intrusion Detection System Using Convolutional Neural Network on UNSW NB15 Dataset ", Advances in Parallel Computing Technologies and Applications, volume 40, November 2021. [20]C. Yin, Y. Zhu, J. Fei, and X. He, "A deep learning approach for intrusion detection using recurrent neural networks, " IEEE Access, vol. 5, pp. 21954–21961, 2017. [21]T. Su, H. Sun, J. Zhu, S. Wang and Y. Li, "BAT: Deep Learning Methods on Network Intrusion Detection Using NSL-KDD Dataset," in IEEE Access, vol. 8, pp. 29575-29585, 2020. [22]S. Choudhary and N. Kesswani, "Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 datasets using deep learning in IoT, " Procedia Comput. Sci., vol. 167, pp. 1561–1573, Jan. 2020. [23]S. Mirjalili, S. M. Mirjalili, and A. Lewis, "Grey wolf optimizer, " Adv. Eng. Softw., vol.69, pp.46–61, Mar. 2014. [24]S. Raja Balachandar and K. Kannan, "A meta-heuristic algorithm for set covering problem based on gravity, " Int. J. Comput. Math. Sci., vol. 4, no. 5, pp. 1025–1030, 2010. [25]J. Kennedy and R. Eberhart, "Particle swarm optimization," Proceedings of ICNN'95 - International Conference on Neural Networks, Perth, WA, Australia, 1995, pp. 1942-1948 vol.4. [26]J. H. Holland, "Genetic algorithms, " Sci. Amer., vol. 267, no. 1, pp. 66–73, 1992. [27]S.J. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. Chan. (1999). KDD Cup 1999 Data. UCI Machine Learning Repository. [28]H. M. Harb, A. A. Zaghrot, M. A. Gomaa, and A. S. Desuky, "Selecting optimal subset of features for intrusion detection systems, " in Proc. Int. Conf. Adv. Comput. Sci. Technol., 2011, pp. 179–192. [29]G. Kocher and G. Kumar, "PERFORMANCE ANALYSIS OF MACHINE LEARNING CLASSIFIERS FOR INTRUSION DETECTION USING UNSW-NB15 DATASET, " Comput. Sci. Inf. Technol. (CS IT), pp. 31– 40. [30]F. H. Kusumaputri and A. S. Arifin, "Anomaly Detection based on NSL-KDD using XGBoost with Optuna Tuning," 2022 7th International Conference on Business and Industrial Research (ICBIR), Bangkok, Thailand, 2022, pp. 586-591. [31]R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat and S. Venkatraman, "Deep Learning Approach for Intelligent Intrusion Detection System," in IEEE Access, vol. 7, pp. 41525-41550, 2019. [32]M. H. Kabir, M. S. Rajib, A. S. M. T. Rahman, M. M. Rahman and S. K. Dey, "Network Intrusion Detection Using UNSW-NB15 Dataset: Stacking Machine Learning Based Approach," 2022 International Conference on Advancement in Electrical and Electronic Engineering (ICAEEE), Gazipur, Bangladesh, 2022, pp. 1-6. [33]L. Jovanovic et al., "The XGBoost Tuning by Improved Firefly Algorithm for Network Intrusion Detection," 2022 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), Hagenberg / Linz, Austria, 2022, pp. 268-275. [34]R. K. Vigneswaran, R. Vinayakumar, K. P. Soman and P. Poornachandran, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security," 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bengaluru, India, 2018, pp. 1-6.
|