References
- K. Wang & S.J. Stolfo. (2004, September). Anomalous payload-based network intrusion detection. RAID. (pp. 203-222). Berlin : Springer.
- N. Williams, S. Zander & G. Armitage. (2006). A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. ACM SIGCOMM Compute Commun, Rev, 36(5), 5-16. https://doi.org/10.1145/1163593.1163596
- UCI KDD Archive. (2005) kdd aRCHIVE. KDDcup99 dataset. KDD [Online]. https://kdd.ics.uci.edu/databases/kddcup99/task.html
- L. Dhanabal & S. P. Shantharajah. (2015). A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms. International Journal of Advanced Research in Computer and Engineering, 4(6), 446-452.
- N. V. Chawla et al. (2002). SMOTE: synthetic minority over-sampling technique. Journal of artificial intelligence research. 16, 321-357. https://doi.org/10.1613/jair.953
- S. Hu et al. (2009). MSMOTE: Improving classification performance when training data is imbalanced. 2009 Second international workshop on computer science and engineering, (2, pp.13-17). IEEE.
- L. Yu et al. (2017). Seqgan: Sequence generative adversarial nets with policy gradient. Thirty-First AAAI Conference on Artificial Intelligence.
- N. Moustafa & J. Slay. (2015). UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). Military communications and information systems conference(MilCIS), IEEE.
- B. Dong & X. Wang. (2016). Comparison deep learning method to traditional methods using for network intrusion detection. 2016 8th IEEE International Conference on Communication Software and Networks(ICCSN), (pp.581-585). IEEE.
- M. Lopez-Martin, B. Carro, A. Sanchez-Esguevillas & J. Lloret. (2017). Network traffic classifier with convolutional and recurrent neural networks for internet of things. IEEE Access, 5, 18042-18050. https://doi.org/10.1109/ACCESS.2017.2747560
- R. K. Rahul et al. (2017). Deep learning for network flow analysis and malware classification. International Symposium on Security in Computing and Communication. Singapore : Springer.
- T. Auld, A. W. Moore & S. F. Gull. (2007). Bayesian neural networks for internet traffic classification. IEEE Transactions on Neural Networks, 18(1), 223-239. https://doi.org/10.1109/TNN.2006.883010
- W. WANG et al. (2017). Malware traffic classification using convolutional neural network for representation learning. 2017 International Conference on Information Networking(ICOIN), (pp. 712-717). IEEE.
- T. Mikolov, K. Chen, G. Corrado & J. Dean. (2013). Efficient estimation of word representations in vector space. arXiv preprint.
- V. Nair & G. E. Hinton (2010). Rectified linear units improve restricted boltzmann machines. Proceedings of the 27th International Conference on Machine Learning(ICML-10), (pp. 807-814).
- Z. Zivkovic. (2004, August). Improved adaptive Gaussian mixture model for background subtraction. ICPR, (2, pp. 28-31), IEEE.
- X. Zhang, J. Zhao & Y. LeCun. (2015). Character-level convolutional networks for text classification. Advances in neural information processing systems. (pp. 649-657).