參考文獻 |
[1] Cisco, “Cisco Annual Internet Report (2018–2023) White Paper”, 2022, Accessed on April 10, 2022. [Online]. Available: https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html
[2] Wikipedia, “Cyberattack”, 2022, Accessed on April 10, 2022. [Online]. Available: https://en.wikipedia.org/wiki/Cyberattack
[3] Geeksforgeeks, “Intrusion Detection System (IDS)”, 2022, Accessed on April 12, 2022. [Online]. Available: https://www.geeksforgeeks.org/intrusion-detection-system-ids/
[4] Alaidaros, Hashem, Massudi Mahmuddin, and Ali Al Mazari. "An overview of flow-based and packet-based intrusion detection performance in high speed networks." Proceedings of the International Arab Conference on Information Technology. 2011, pp. 1-9.
[5] Wikipedia, “Deep learning”, 2022, Accessed on April 11, 2022. [Online]. Available: https://en.wikipedia.org/wiki/Deep_learning
[6] Wikipedia, “Convolutional neural network”, 2022, Accessed on April 11, 2022. [Online]. Available: https://en.wikipedia.org/wiki/Convolutional_neural_network
[7] Wikipedia, “Recurrent neural network”, 2022, Accessed on April 11, 2022. [Online]. Available: https://en.wikipedia.org/wiki/Recurrent_neural_network
[8] Distill, “A Gentle Introduction to Graph Neural Networks”, 2022, Accessed on April 10, 2022. [Online]. Available: https://distill.pub/2021/gnn-intro/
[9] Christophm, “Interpretable Machine Learning”, 2022, Accessed on April 11, 2022. [Online]. Available: https://christophm.github.io/interpretable-ml-book/
[10] Patcha, Animesh, and Jung-Min Park. "An overview of anomaly detection techniques: Existing solutions and latest technological trends." Computer networks 51.12 (2007): 3448-3470.
[11] Staniford-Chen, Stuart, et al. "GrIDS-a graph based intrusion detection system for large networks." Proceedings of the 19th national information systems security conference. Vol. 1. 1996, pp. 361-370.
[12] Z. Mingqiang, H. Hui and W. Qian, "A graph-based clustering algorithm for anomaly intrusion detection," 2012 7th International Conference on Computer Science & Education (ICCSE), 2012, pp. 1311-1314.
[13] Gardner, Matt W., and S. R. Dorling. "Artificial neural networks (the multilayer perceptron)—a review of applications in the atmospheric sciences." Atmospheric environment 32.14-15 (1998): 2627-2636.
[14] Hamilton, Will, Zhitao Ying, and Jure Leskovec. "Inductive representation learning on large graphs." Advances in neural information processing systems 30 (2017).
[15] Ribeiro, Marco Tulio, Sameer Singh, and Carlos Guestrin. "′ Why should i trust you?′ Explaining the predictions of any classifier." Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining. 2016, pp. 1135-1144.
[16] Lundberg, Scott M., and Su-In Lee. "A unified approach to interpreting model predictions." Advances in neural information processing systems 30 (2017).
[17] Q. Huang, M. Yamada, Y. Tian, D. Singh and Y. Chang, "GraphLIME: Local Interpretable Model Explanations for Graph Neural Networks," IEEE Transactions on Knowledge and Data Engineering, 2022.
[18] Ying, Zhitao, et al. "Gnnexplainer: Generating explanations for graph neural networks." Advances in neural information processing systems 32 (2019).
[19] Wikipedia, “Shapley value”, 2022, Accessed on April 12, 2022. [Online]. Available: https://en.wikipedia.org/wiki/Shapley_value
[20] A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras and B. Stiller, "An Overview of IP Flow-Based Intrusion Detection," IEEE Communications Surveys & Tutorials, vol. 12, no. 3, pp. 343-356, Third Quarter 2010.
[21] Wang, Jin-Fa, et al. "Using complex network theory for temporal locality in network traffic flows." Physica A: Statistical Mechanics and its Applications 524 (2019): 722-736.
[22] X. Yuan, C. Li and X. Li, "DeepDefense: Identifying DDoS Attack via Deep Learning," 2017 IEEE International Conference on Smart Computing (SMARTCOMP), 2017, pp. 1-8.
[23] C. Yin, Y. Zhu, J. Fei and X. He, "A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks," IEEE Access, vol. 5, pp. 21954-21961, 2017.
[24] W. W. Lo, S. Layeghy, M. Sarhan, M. Gallagher and M. Portmann, "E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT," NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 2022, pp. 1-9.
[25] Jin Kim, Nara Shin, S. Y. Jo and Sang Hyun Kim, "Method of intrusion detection using deep neural network," 2017 IEEE International Conference on Big Data and Smart Computing (BigComp), 2017, pp. 313-316.
[26] Min, Erxue, et al. "TR-IDS: Anomaly-based intrusion detection through text-convolutional neural network and random forest." Security and Communication Networks 2018 (2018).
[27] Tang, Duyu, et al. "Learning sentiment-specific word embedding for twitter sentiment classification." ACL (1). 2014, pp. 1555-1565.
[28] Chen, Yahui. "Convolutional neural network for sentence classification." MS thesis. University of Waterloo, 2015.
[29] Mahbooba, Basim, et al. "Explainable artificial intelligence (XAI) to enhance trust management in intrusion detection systems using decision tree model." Complexity 2021 (2021).
[30] Quinlan, J. Ross. "Induction of decision trees." Machine learning 1.1 (1986): 81-106.
[31] Norton, Steven W. "Generating better decision trees." IJCAI. Vol. 89. 1989.
[32] UNB, “Intrusion Detection Evaluation Dataset (CIC-IDS2017)”, 2022, Accessed on April 21, 2022. [Online]. Available: https://www.unb.ca/cic/datasets/ids-2017.html
[33] Sharafaldin, Iman, Arash Habibi Lashkari, and Ali A. Ghorbani. "Toward generating a new intrusion detection dataset and intrusion traffic characterization." ICISSp 1 (2018): 108-116.
[34] UNB, “CICFlowMeter (formerly ISCXFlowMeter)”, 2022, Accessed on April 21, 2022. [Online]. Available: https://www.unb.ca/cic/research/applications.html#CICFlowMeter
[35] Paszke, Adam, et al. "Pytorch: An imperative style, high-performance deep learning library." Advances in neural information processing systems 32 (2019).
[36] NVIDIA Corporation, “CUDA TOOLKIT”, 2022, April 24, 2022. [Online]. Available: https://developer.nvidia.com/cuda-toolkit
[37] NVIDIA Corporation, “NVIDIA cuDNN”, 2022, April 24, 2022. [Online]. Available: https://developer.nvidia.com/cudnn
[38] Wang, Minjie, et al. "Deep graph library: A graph-centric, highly-performant package for graph neural networks." arXiv preprint arXiv:1909.01315 (2019).
[39] Weiss, Karl, Taghi M. Khoshgoftaar, and DingDing Wang. "A survey of transfer learning." Journal of Big data 3.1 (2016): 1-40.
[40] Chawla, Nitesh V., et al. "SMOTE: synthetic minority over-sampling technique." Journal of artificial intelligence research 16 (2002): 321-357.
[41] Wikipedia, “Oversampling and undersampling in data analysis”, 2022, Accessed on April 25, 2022. [Online]. Available: https://en.wikipedia.org/wiki/Oversampling_and_undersampling_in_data_analysis#Tomek_links
[42] Github, “CICFlowMeter”, 2022, Accessed on April 30, 2022. [Online]. Available: https://github.com/CanadianInstituteForCybersecurity/CICFlowMeter |