Acknowledgement
본 연구는 방위사업청과 국방과학연구소의 지원으로 수행되었음(UD2000014ED).
References
- Y. G. Choi and S. S. Park, "Reinforcement Mining Method for Anomaly Detection and Misuse Detection using Post-processing and Training Method," Proceedings of the Korean Information Science Society Conference, pp.238-240, 2006.
- S. O. Choi and W. N. Kim, "Control system intrusion detection system technology research trend," Review of Korea Institute of Information Security & Cryptology, Vol.24, No.5, pp.7-14, 2014.
- G. Pang, C. Shen, L. Cao, and A. V. D. Hengel, "Deep learning for anomaly detection: A review," arXiv preprint arXiv: 2007.02500 (2020).
- M. M. Rohling, M. Grimmer, D. Kreubel, J. Hoffmann, and B. Franczyk, "Standardized container virtualization approach for collecting host intrusion detection data," 2019 Federated Conference on Computer Science and Information Systems (FedCSIS), IEEE, 2019.
- O. Yavanoglu and M. Aydos, "A review on cyber security datasets for machine learning algorithms," 2017 IEEE International Conference on Big Data (Big Data), IEEE, 2017.
- M. Pendleton and S. Xu, "A dataset generator for next generation system call host intrusion detection systems," MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), IEEE, 2017.
- L.N. Tidjon, M. Frappier, and A. Mammar, "Intrusion detection systems: A cross-domain overview," IEEE Communications Surveys & Tutorials, Vol.21, No.4, pp.3639-3681, 2019. https://doi.org/10.1109/COMST.2019.2922584
- H. Kwon, Y. Kim, H. Yoon, and D. Choi, "Optimal cluster expansion-based intrusion tolerant system to prevent denial of service attacks," Applied Sciences, Vol.7, No.11, pp.1186, 2017. https://doi.org/10.3390/app7111186
- P. Laskov, P. Dussel, C. Schafer, and K. Rieck, "Learning intrusion detection: supervised or unsupervised?," International Conference on Image Analysis and Processing, Springer, Berlin, Heidelberg, 2005.
- J. H. Kim and H. W. Kim, "An effective intrusion detection classifier using long short-term memory with gradient descent optimization," 2017 International Conference on Platform Technology and Service (PlatCon), IEEE, 2017.
- G. Kim, H. Yi, J. Lee, Y. Paek, and S. Yoon, "LSTM-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems," arXiv preprint arXiv:1611.01726, 2016.
- R. D. Ravipati and M. Abualkibash, "Intrusion Detection System Classification Using Different Machine Learning Algorithms on KDD-99 and NSL-KDD Datasets-A Review Paper," International Journal of Computer Science & Information Technology, Vol.11, 2019.
- A. K Verma, P. Kaushik, and G. Shrivastava, "A Network Intrusion Detection Approach Using Variant of Convolution Neural Network," 2019 International Conference on Communication and Electronics Systems (ICCES), IEEE, 2019.
- J. Kim, J. Kim, H. Kim, M. Shim, and E. Choi, "CNN-Based Network Intrusion Detection against Denial-of-Service Attacks," Electronics, Vol.9, No.6, pp.916, 2020. https://doi.org/10.3390/electronics9060916
- R. U. Khan, X. Zhang, M. Alazab, and R. Kumar, "An improved convolutional neural network model for intrusion detection in networks," 2019 Cybersecurity and Cyberforensics Conference (CCC), IEEE, 2019.
- R. Upadhyay and D. Pantiukhin, "Application of convolutional neural network to intrusion type recognition," Proceedings of the 2017 International Conference on Advances in Computing, Communications and Informatics, Udupi, India, pp.13-16, 2017.
- S. C. Hsiao, D. Y. Kao, Z. Y. Liu, and R. Tso, "Malware image classification using one-shot learning with Siamese networks," Procedia Computer Science, Vol.159, pp.1863-1871, 2019. https://doi.org/10.1016/j.procs.2019.09.358
- S. Moustakidis and P. Karlsson, "A novel feature extraction methodology using Siamese convolutional neural networks for intrusion detection," Cybersecurity, Vol.3, No.1, pp.1-13, 2020. https://doi.org/10.1186/s42400-019-0043-x
- Y. Taigman, M. Yang, M. A. Ranzato, and L. Wolf, "Deepface: Closing the gap to human-level performance in face verification," Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2014.
- S. E. Jang and J. T. Kim, "Few-shot classification of Histopathology image using Batch Hard Loss-based Siamese Networks," The Korean Institute of Information Scientists and Engineers, pp.634-636, 2019.