References
- 과학기술정보통신부, "무선데이터 트래픽 통계", Online, 2020Available:https://msit.go.kr/web/msipContents/contentsView.do?cateId=_status&artId=3067561
- 국경완, 공병철, "인공지능을 활용한 보안기술 개발 동향", 정보통신기획평가원 주간기술동향, 1913호, pp 5, 2019.
- 박형근, "정보보안에서의 인공지능 도입 분야와 주요 사업자", 시큐리티플러스, pp.3-9, 2018.
- A. Khraisat, I. Gondal, P. Vamplew, J. Kamruzzaman, "Survey of intrusion detection systems: techniques, datasets and challenges", Cybersecurity, pp.1-22, 2019.
- Y. Lecun, Y. Bengio, G. Hinton, "Deep learning", Nature, vol.521, no.7553, pp.436-444, 2015. https://doi.org/10.1038/nature14539
- W. Kehe, C. Zuge, L. Wei, "A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks", IEEE Access, vol.6, pp.50850-50859, 2018. https://doi.org/10.1109/access.2018.2868993
- M. A. Salama, H. F. Eid, R. A. Ramadan, A. Darwish, A. E. Hassanien, "Hybrid intelligent intrusion detection scheme", Soft Computing in Industrial Applications, Berlin, Germany:Springer, pp.293-303, 2011.
- U. Fiore, F. Palmieri, A. Castiglione, A. De Santis, "Network anomaly detection with the restricted Boltzmann machine", Neurocomputing, vol.122, pp.13-23, Dec, 2013. https://doi.org/10.1016/j.neucom.2012.11.050
- J. Kim, J. Kim, H. L. T. Thu, H. Kim, "Long short term memory recurrent neural network classifier for intrusion detection", Proc. Int. Conf. Platform Service, pp.1-5, 2016.
- T. T. H. Le, J. Kim, H. Kim, "An effective intrusion detection classifier using long short-term memory with gradient descent optimization", Proc. Int. Conf. Platform Technol. Service, pp.1-6, 2017.
- R. Vinayakumar, K. P. Soman, P. Poornachandran, "Applying convolutional neural network for network intrusion detection", Proc. Int. Conf. Adv. Comput. Commun. Inform., pp.1222-1228, 2017.
- W. Wang, M. Zhu, X. Zeng, X. Ye, Y. Sheng, "Malware traffic classification using convolutional neural network for representation learning", Proc. Int. Conf. Inf. Netw., pp.712-717, Jan. 2017.
- M. Wang, J. Li, "Network intrusion detection model based on convolutional neural network", J. Inf. Secur. Res., vol.3, pp.990-994, 2017.
- E. Min, J. Long, Q. Liu, J. Cui, W. Chen, "TR-IDS: Anomaly-based intrusion detection through text-convolutional neural network and random forest", Secur. Commun. Netw., vol. 2018, Jul. 2018.
- W. Wang, "HAST-IDS: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection", IEEE Access, vol.6, pp.1792-1806, 2018. https://doi.org/10.1109/access.2017.2780250
- L. Peng, H. Zhang, Y. Chen, B. Yang, "Imbalanced traffic identification using an imbalanced data gravitation-based classification model", Comput. Commun., vol. 102, pp. 177-189, 2016. https://doi.org/10.1016/j.comcom.2016.05.010
- Y. Liu, S. Liu, X. Zhao, "Intrusion detection algorithm based on convolutional neural network", Beijing Ligong Daxue Xuebao/Trans. Beijing Inst. Technol., vol.37, no.12, pp.1271-1275, 2017.
- Chuanlong Y., Yuefei Z., Shengli L., Jinlong F., Hetong Z, "Enhancing network intrusion detection classifiers using supervised adversarial training", The Journal of Supercomputing, pp. 6690-6719, 2020.
- G. Ian, P. Jean, M. Mehdi, X. Bing, W. David, O. Sherjil, C. Aaron, B. Yoshua, "Generative Adversarial Nets", Neural Information Processing Systems, pp.2672-2680, 2014.
- O. Augustus, "Semi-Supervised Learning with Generative Adversarial Networks", arXiv preprint arXiv:1606.01583, 2016.
- T. Mahbod, B. Ebrahim, L. Wei, A. AlI, "A Detailed Analysis of the KDD CUP 99 Data Set", 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009.