1 |
Aljawarneh, Shadi, Monther Aldwairi, and Muneer Bani Yassein, "Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model", Journal of Computational Science, Vol. 25, pp. 152-160, 2018.
DOI
|
2 |
Chandola, Varun, Arindam Banerjee, and Vipin Kumar, "Anomaly detection: A survey." ACM computing surveys (CSUR), Vol. 41, No. 3, pp. 1-58, 2009.
|
3 |
Ahmed, Mohiuddin, Abdun Naser Mahmood, and Jiankun Hu, "A survey of network anomaly detection techniques." Journal of Network and Computer Applications, Vol. 60, pp. 19-31, 2016.
DOI
|
4 |
Jabez, Ja, and B. Muthukumar, "Intrusion detection system (IDS): anomaly detection using outlier detection approach", Procedia Computer Science, Vol. 48, pp. 338-346, 2015.
DOI
|
5 |
Cook, Andrew A., Goksel Misirli, and Zhong Fan, "Anomaly detection for IoT time-series data: A survey", IEEE Internet of Things Journal, Vol. 7, No. 7, pp. 6481-6494, 2019.
DOI
|
6 |
한국인터넷진흥원, "사이버 위협 동향 보고서(2020년 1분기)", pp. 1-104, 2020년 4월..
|
7 |
한국인터넷진흥원, "사이버 위협 동향 보고서(2020년 2분기)", pp. 1-124, 2020년 7월..
|
8 |
하우리, "악성코드분류별통계", https://www.hauri.co.kr/security/malicious_pop01.html, 2021년 3월..
|
9 |
MITRE, "MITRE ATT&CK," https://www.attack.mitre.org Mar. 2021.
|
10 |
Abdallah, Aisha, Mohd Aizaini Maarof, and Anazida Zainal, "Fraud detection system: A survey." Journal of Network and Computer Applications, Vol. 68, pp. 90-113, 2016.
DOI
|
11 |
HYBRID ANALYSIS, "Hybrid-nalysis," https://www.hybrid-analysis.com/?lang=ko Mar. 2021.
|
12 |
Chalapathy, Raghavendra, and Sanjay Chawla, "Deep learning for anomaly detection: A survey", arXiv preprint, arXiv:1901.03407, 2019.
|
13 |
Bontemps, Loic, James McDermott, and Nhien-AnLe-Khac, "Collective anomaly detection based on long short-term memory recurrent neural networks", International Conference on Future Data and Security Engineering. Springer, Cham, 2016.
|
14 |
DARKTRACE, "Enterprise Immune System," https://www.darktrace.com/ko/ Mar. 2021
|