Author:
Yu Yang,Long Jun,Cai Zhiping
Publisher
Springer International Publishing
Reference21 articles.
1. The CTU-13 dataset.
https://stratosphereips.org/category/dataset.html
2. The UNB ISCX 2012 intrusion detection evaluation dataset.
http://www.unb.ca/cic/research/datasets/ids.html
3. Cai, Z., Wang, Z., Zheng, K., Cao, J.: A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering. IEEE Trans. Comput. 62(3), 417–427 (2013)
4. Cheng, J., Yin, J., Liu, Y., Cai, Z., Wu, C.: DDoS attack detection using IP address feature interaction. In: International Conference on Intelligent Networking and Collaborative Systems, INCOS 2009, pp. 113–118. IEEE (2009)
5. Erfani, S.M., Rajasegarar, S., Karunasekera, S., Leckie, C.: High-dimensional and large-scale anomaly detection using a linear one-class svm with deep learning. Pattern Recogn. 58, 121–134 (2016)
Cited by
48 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Deep Learning for Network Intrusion Detection in Virtual Networks;Electronics;2024-09-11
2. A Two-Phase Multi-Class Botnet Labeling Approach for Real-World Traffic;2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC);2024-02-19
3. A Comprehensive Survey of Software Defined Networking and its Security Threats;2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC);2024-01-08
4. A Critical Server Security Protection Strategy Based on Traffic Log Analysis;Communications in Computer and Information Science;2024
5. AcLGB: A Lightweight DDoS Attack Detection Method;Smart Innovation, Systems and Technologies;2023-11-03