Acknowledgement
이 논문은 2021학년도 안동대학교 학술연구조성비에 의하여 연구되었음
References
- M. Macas, C. Wu, and W. Fuertes, "A survey on deep learning for cybersecurity: Progress, challenges, and opportunities," Computer Networks, vol. 212, 2022, pp. 1-33. https://doi.org/10.1016/j.comnet.2022.109032
- Y. Chun, "Hacking Detection Mechanism of Cyber Attacks Modeling," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 9, 2013, pp. 1313-1318. https://doi.org/10.13067/JKIECS.2013.8.9.1313
- M. Ahsan, K. E. Nygard, R. Gomes, M. M. Chowdhury, N. Rifat, and J. F. Connolly, "Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning-A Review," J. of Cybersecurity and Privacy, vol. 2, no. 3, 2022, pp. 527-555. https://doi.org/10.3390/jcp2030027
- H. Liu and B. Lang, "Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey," Applied Sciences, vol. 9, no. 20, 2019, pp. 1-28. https://doi.org/10.3390/app9204396
- P. Toupas, D. Chamou, K. M. Giannoutakis, A. Drosou, and D. Tzovaras, "An Intrusion Detection System for Multi-Class Classification based on Deep Neural Networks," In Proc. International Conf. on Machine Learning and Applications, Boca Raton, FL, USA, Dec. 2019.
- Y. Lee, "A Design and Analysis of Multiple Intrusion Detection Model," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 6, 2016, pp. 619-626. https://doi.org/10.13067/JKIECS.2016.11.6.619
- Y. Zeng, H. Gu, W. Wei, and Y. Guo, "Deep-Full-Range : A Deep Learning Based Network Encrypted Traffic Classification and Intrusion Detection Framework," IEEE Access, vol. 7, 2019, pp. 45182-45190. https://doi.org/10.1109/ACCESS.2019.2908225
- N. N. Tran, R. Sarker, and J. Hu, "An Approach for Host-Based Intrusion Detection System Design Using Convolutional Neural Network," In Proc. of the Int. Conf. Mobile Networks and Management, Chiba, Japan, Sept. 2017, pp. 116-126.
- A. Tuor, S. Kaplan, B. Hutchinson, N. Nichols, and S. Robinson, "Deep learning for unsupervised insider threat detection in structured cybersecurity data streams," In Proc. Works. AAAI Conf. AI, San Francisco, USA, Feb. 2017.
- R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, "Deep Learning Approach for Intelligent Intrusion Detection System," IEEE Access, vol. 7, 2019, pp. 41525-41550. https://doi.org/10.1109/ACCESS.2019.2895334
- H. Zhang, X. Yu, P. Ren, C. Luo, and G. Min, "Deep Adversarial Learning in Intrusion Detection: A Data Augmentation Enhanced Framework," ArXiv, abs/1901.07949, vol. 3, 2019.
- J. Song, X. Wang, M. He, and L. Jin, "CSK-CNN: Network Intrusion Detection Model Based on Two-Layer Convolution Neural Network for Handling Imbalanced Dataset," Information, vol. 14, no. 2, 2023, p. 1-17.
- J. Kwon and S. Cho, "Performance Analysis of Fingerprinting Method for LTE Positioning according to W-KNN Correlation Techniques in Urban Area," J. of the Korea Institute of Electronic Communication Sciences, vol. 16, no. 6, 2021, pp. 1059-1068.
- K. Kim, J Kang, S. Han and J Park, "Development of Machine Learning-based Flood Depth and Location Prediction Model," J. of the Korea Institute of Electronic Communication Sciences, vol. 18, no. 1, 2023, pp. 91-98.
- F. Amiri, M. M. R. Yousefi, C. Lucas, A. Shakery, and N. Yazdani, "Mutual information-based feature selection for intrusion detection systems," J. Network and Computer Applications, vol. 34, no. 4, 2011, pp. 1184-1199. https://doi.org/10.1016/j.jnca.2011.01.002
- M. A. M. Hasan, M. Nasser, B. Pal, and S. Ahmad, "Support vector machine and random forest modeling for intrusion detection system (IDS)," J. Intelligent Learning Systems and Applications, vol. 6, no. 1, 2014, pp. 45-52. https://doi.org/10.4236/jilsa.2014.61005