References
- Gaurav, M., Babita, D., Mehul, M., Kamal, H.: Performance Comparison of Network Intrusion Detection System Based on Different Pre-processing Methods and Deep Neural Network. In: DSMLAI '21', August 9-12, 2021, Windhoek, Namibia (2021)
- Jay, S., Manollas, M.: Efficient Deep CNN-BiLSTM Model for Network Intrusion Detection. In: AIPR 2020, June 26-28, 2020, Xiamen, China (2020)
- Shweta, P., Meenakshi, T., Subham, G.: Leveraging LSTM-RNN combined with SVM for Network Intrusion. In: DSMLAI'21, August 9-12, 2021, Windhoek, Namibia (2021)
- Kaho, W., Joel, C.: Game-Theoretic Modeling of DDoS Attacks in Cloud Computing. In: UCC'21, December 6-9, 2021, Leicester, United Kingdom (2021)
- Dylan, C., Meng, J.: A Survey on Data-driven Network Intrusion Detection. In: ACM Computing Surveys, Vol. 54, No. 9, Article 182. Publication date: October 2021 (2021)
- Kumar, S., Debi, M.: DDoS Detection and Defense: Client Termination Approach. In: CUBE 2012, September 3-5, 2012, Pune, Maharashtra, India (2012)
- Zhewei, C., Linyue, Z., Wenwen, Y.: ADASYN-Random Forest Based Intrusion Detection Model. In: SPML 2021, August 18-20, 2021, Beijing, China (2021)
- Aouatif, A., Omar, B., Hicham, B., Abdelmajid, M.: A Review of Intrusion Detection Systems: Datasets and machine learning methods. In: NISS2021, April 01, 02, 2021, KENITRA, AA, Morocco (2021)
- Long,C., Gao, X., Zhao, J., Wan, W., Shen, H., Gao, P.: Intrusion Detection Using End-to-End Memory Network. In: ICCIS 2017, November 7-9, 2017, Wuhan, China (2017)
- Andrea, C., Shanchieh, Y., Giovanni, A.: On the Evaluation of Sequential Machine Learning for Network Intrusion Detection. In: ARES 2021, August 17-20, 2021, Vienna, Austria (2021)
- Florian, W., Felix, O., Steffen, H., Matthias, V., Mathias, F.: Multi-Stage Attack Detection via Kill Chain State Machines. In: CYSARM '21, November 19, 2021, Virtual Event, Republic of Korea (2021)
- Carlos, G., Emmanouil, V., Aidmar, W., Max, M., Simin, N.: On Generating Network Traffic Datasets with SyntheticAttacks for Intrusion Detection. In: ACM Transactions on Privacy and Security, Vol. 24, No. 2, Article 8. Publication date: December 2020 (2020)
- Hao, L.: A Survey on Machine Learning based Intrusion Detection Systems Using Apache Spark. In: HPCCT'21, July 02-04, 2021, Qingdao, China (2021)
- Zichuan, J., Yanpeng, C., Zheng, Y.: Survey of Intrusion Detection Methods Based on Data Mining Algorithms. In: BDE 2019, June 11-13, 2019, Hong Kong, Hong Kong (2019)
- Mohamed, A., Youness, K., El mostapha, C.: A survey and taxonomy of techniques used for alerts of Intrusion Detection Systems. In: BDIoT'19, October 23-24, 2019, Rabat, Morocco (2019)
- Arun, N., Satish, K.: An Extensive Survey on Intrusion Detection- Past, Present, Future. In: ICEMIS '18, June 19-20, 2018, Istanbul, Turkey (2018)
- Xue-Chao, S., Hai-Yan, F., Yu-Qing, C.: Network Intrusion Detection Based on One-dimensional Convolution Layer Autoencoders. In: ICFEICT 2021, May 21-23, 2021, Changsha, China (2021)
- Guansong, P., Chunhua, S., Anton, H., Longbing, C.: Toward Deep Supervised Anomaly Detection: Reinforcement Learning from Partially Labeled Anomaly Data. In: KDD '21, August 14-18, 2021, Virtual Event, Singapore (2021)
- Eva, P., Sotiris, I.: A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures. In: ACM Computing Surveys, Vol. 54, No. 6, Article 123. Publication date: July 2021 (2021)
- Radoslava, S., Christian, L.: A Semi-Supervised Approach for Network Intrusion Detection. In: ARES 2020, August 25-28, 2020, Virtual Event, Ireland (2020)
- Xiaojie, W., Laisen, N., Zhaolong, N., Lei, G., Guoyin, W., Xinbo., G., Neeraj, K.: Deep Learning-based Network Trafic Prediction for Secure Backbone Networks in Internet of Vehicles. In: ACM Trans. Internet Technol (2022)
- Yujie, Z., Dezhi, H., Xinming, Y.: A hierarchical network intrusion detection model based on unsupervised clustering. In: MEDES '21, November 1-3, 2021, Hammamet, Tunisia (2021)
- Hatitye, C., Dane, B.: Adaptive Machine Learning Based Network Intrusion Detection. In: icARTi '21, December 9-10, 2021, Virtual Event, Mauritius (2021)
- Naga, K., Rajesh, Y., Raghava, S.: A Painstaking Analysis of Attacks on Hypervisors in Cloud Environment. In: ICMLT 2021, April 23-25, 2021, Jeju Island, Republic of Korea (2021)
- Elisa, B., Imtiaz, K.: AI-powered Network Security: Approaches and Research Directions. In: 8th NSysS 2021, December 21-23, 2021, Cox's Bazar, Bangladesh (2021)
- Zhao, M., Xiuhua, L., Chuan, S., Qilin, F., Xiaofei, W., Victor, C.: Sleeping Cell Detection for Resiliency Enhancements in 5G/B5G Mobile Edge-Cloud Computing Networks. In: 2022 Association for Computing Machinery (2022)
- Nagai, R., Kurihara, W., Higuchi, S., Hirotsu, T.: Design and Implementation of an OpenFlow based TCP SYN Flood Mitigation. In: 2573-7562/18/$31.00 ©2018 IEEE DOI 10.1109/MobileCloud.2018.00014 (2018)
- Quang, D.: Evaluating machine learning algorithms for intrusion detection systems using the dataset CIDDS-002. In: CSSE 2021, October 22-24, 2021, Singapore, Singapore (2021)
- Hanan, H., Christos, T., Robert, A.: Developing a Siamese Network for Intrusion Detection Systems. In: EuroMLSys '21, April 26, 2021, Online, United Kingdom (2021)
- Suresh, A., Thushara, R., Sumohana, C., Bheemarjuna, T.: On Handling Class Imbalance in Continual Learning based Network Intrusion Detection Systems. In: AIMLSystems '21, October 21-23, 2021, Bangalore, India (2021)