參考文獻 |
[1] A. Nastuła, “Dilemmas related to the functioning and growth of Darknet and the Onion Router network,” 2020 Social Development and Security, vol. 10, no. 2, pp. 3-10, 2020.
[2] R. Figueiredo and K. Subratie, “Edgevpn.io: Open-source virtual private network for seamless edge computing with Kubernetes,” 2020 IEEE/ACM Symposium on Edge Computing (SEC 2020), pp. 190-192, 2020.
[3] CNBC, “Operation SpecTor” Accessed on May 16, 2023. [Online]. Available: https://www.cnbc.com/2023/05/02/operation-spector-288-arrests-made-in-international-drug-takedown.html
[4] TechTarget, “Intrusion detection system (IDS)”, Accessed on May 16, 2023. [Online]. Available: https://www.techtarget.com/searchsecurity/definition/ intrusion-detection-system
[5] IBM, “Machine learning” , Accessed on May 16, 2023. [Online]. Available: https://www.ibm.com/topics/machine-learning
[6] CISCO, “Cyberattack”, Accessed on May 16, 2023. [Online]. Available: https://www.cisco.com/c/en/us/products/security/common-cyberattacks.html
[7] Wikipedia, “Hyperparameter”, Accessed on May 18, 2023. [Online]. Available: https://en.wikipedia.org/wiki/Hyperparameter_(machine_learning)
[8] U. M. Khaire and R. Dhanalakshmi, “Stability of feature selection algorithm: A review,” 2022 Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 4, pp. 1060-1073, 2022.
[9] Tor Project, Inc. “Tor project | Anonymity Online”, Accessed on May 17, 2023. [Online]. Available: https://www.torproject.org/
[10] Investopedia, “Internet service provider (ISP)” , Accessed on May 17, 2023. [Online]. Available: https://www.investopedia.com/terms/i/isp.asp
[11] T. Wangchuk, D. Rathod, “Forensic and behavior analysis of free Android VPNs,” 2021 Journal of Applied Engineering, Technology and Management, vol. 1, no. 1, pp. 91-101, 2021.
[12] Surfshark, “Using Tor over a VPN”, Accessed on May 17, 2023. [Online]. Available: https://surfshark.com/blog/tor-over-vpn
[13] AT&T Business, “Hosted IDS: host-based intrusion detection system” , Accessed on May 17, 2023. [Online]. Available: https://cybersecurity.att.com/solutions/ host-intrusion-detection-system
[14] Netacea, “Network intrusion detection system (NIDS)” , Accessed on May 17, 2023. [Online]. Available: https://netacea.com/glossary/network-intrusion-detection-system-nids/
[15] H. K. Lim, J. B. Kim, J.S. Heo, K. Kim, Y. G. Hong, and Y. H. Han. “Packet-based network traffic classification using deep learning.” 2019 IEEE International Conference on Artificial Intelligence in Information and Communication (ICAIIC 2019), pp. 046-051. 2019
[16] M. Ring, D. Schlör, D. Landes, and A. Hotho, “Flow-based network traffic generation using generative adversarial networks,” 2019 Computers & Security, vol. 82, pp. 156-172, 2019.
[17] C. Bentéjac, A. Csörgő, and G. Martínez-Muñoz, “A comparative analysis of gradient boosting algorithms,” 2021 Artificial Intelligence Review, vol. 54, pp. 1937-1967, 2021.
[18] T. Chen and C. Guestrin, “Xgboost: a scalable tree boosting system,” 2016 The 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785-794, 2016.
[19] C. Bentéjac, A. Csörgő, and G. Martínez-Muñoz, “A comparative analysis of gradient boosting algorithms,” 2021 Artificial Intelligence Review, vol. 54, pp. 1937-1967, 2021
[20] Built In, “L1 and L2 regularization methods, explained”, Accessed on May 18, 2023. [Online]. Available: https://builtin.com/data-science/l2-regularization
[21] B. S. Bhati, G. Chugh, F. Al-Turjman, and N. S. Bhati, “An improved ensemble based intrusion detection technique using XGBoost,” 2021 Transactions on Emerging Telecommunications Technologies, vol. 32, no. 6, pp. 4076, 2021.
[22] W. Xu and Y. Fan, “Intrusion detection systems based on logarithmic autoencoder and XGBoost,” 2022 Security and Communication Networks, vol. 2022.
[23] T. M. Shami, A. A. El-Saleh, M. Alswaitti, Q. Al-Tashi, M. Amen Summakieh, and S. Mirjalili, “Particle swarm optimization: a comprehensive survey,” 2022 IEEE Access, vol. 10, pp. 10031-10061, 2022.
[24] J. Kennedy and R. Eberhart, “Particle swarm optimization,” 1995 International Conference on Neural Networks (ICNN 1995), vol. 4, pp. 1942-1948, 1995.
[25] M. Zöller and M. F. Huber, “Benchmark and survey of automated machine learning frameworks,” 2021 Journal of Artificial Intelligence Research, vol. 70, pp. 409-472, 2021.
[26] M. Feurer, K. Eggensperger, S. Falkner, M. Lindauer, and F. Hutter, “Auto-sklearn 2.0: hands-free automl via meta-learning,” 2022 The Journal of Machine Learning Research, vol. 23, no. 1, pp. 11936-11996, 2022.
[27] H. Jin, F. Chollet, Q. Song, and X. Hu, “Autokeras: An automl library for deep learning,” 2023 Journal of Machine Learning Research, vol. 24, no. 6, pp. 1-6, 2023.
[28] F. R. Adaryani, S. J. Mousavi, and F. Jafari, “Short-term rainfall forecasting using machine learning-based approaches of PSO-SVR, LSTM and CNN,” 2022 Journal of Hydrology, vol. 614, p. 128463, 2022.
[29] X. Cai and R. J. Wai, “Intelligent DC arc-fault detection of solar PV power generation system via optimized VMD-based signal processing and PSO-SVM classifier,” 2022 IEEE Journal of Photovoltaics, vol. 12, no. 4, pp. 1058-1077, 2022.
[30] H. Das, B. Naik, and HS Behera, “A Jaya algorithm based wrapper method for optimal feature selection in supervised classification,” 2022 Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 6, pp. 3851-3863, 2022.
[31] S. M. Kasongo and Y. Sun, “Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset,” 2020 Journal of Big Data, vol. 7, pp. 1-20, 2020.
[32] F. A. Saputra, I. U. Nadhori, and B. F. Barry, “Detecting and blocking onion router traffic using deep packet inspection,” 2016 International Electronics Symposium (IES 2016), pp. 283-288, 2016.
[33] Wireshark Foundation, “Wireshark”, Accessed on May 18, 2023. [Online]. Available: https://www.wireshark.org/download.html
[34] A. Habibi Lashkari, G. Kaur, and A. Rahali, “Didarknet: A contemporary approach to detect and characterize the darknet traffic using deep image learning,” 2020 The 10th International Conference on Communication and Network Security (ICCNS 2020), pp. 1-13, 2020.
[35] B. Charbuty and A. Abdulazeez, “Classification based on decision tree algorithm for machine learning,” 2021 Journal of Applied Science and Technology Trends, vol. 2, no. 01, pp. 20-28, 2021.
[36] D. Sarkar, P. Vinod, and S. Y. Yerima, “Detection of Tor traffic using deep learning,” 2020 IEEE/ACS The 17th International Conference on Computer Systems and Applications (AICCSA 2020), pp. 1-8, 2020.
[37] M. Cherrington, F. Thabtah, J. Lu, and Q. Xu, “Feature selection: filter methods performance challenges,” 2019 International Conference on Computer and Information Sciences (ICCIS 2019), pp. 1-4, 2019.
[38] B. Singh, N. Kushwaha, O. P. Vyas, “A feature subset selection technique for high dimensional data using symmetric uncertainty,” 2014 Journal of Data Analysis and Information Processing (JDAIP 2014), vol. 2, no. 04, p. 95, 2014.
[39] Q. Abu Al-Haija, M. Krichen, and W. Abu Elhaija, “Machine-learning-based darknet traffic detection system for IoT applications,” 2022 Electronics, vol. 11, no. 4, p. 556, 2022.
[40] UNB, “CICFlowMeter” Accessed on May 20, 2023. [Online]. Available: https://www.unb.ca/cic/research/applications.html
[41] UNB, “CIC-Darknet2020” Accessed on May 22, 2023. [Online]. Available: https://www.unb.ca/cic/datasets/darknet2020.html
[42] G. Draper-Gil, A. H. Lashkari, M. S. I. Mamun, and A. A. Ghorbani, “Characterization of encrypted and VPN traffic using time-related,” 2016 The 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), pp. 407-414, 2016.
[43] A. H. Lashkari, G. Draper-Gil, M. S. I. Mamun, A. A. Ghorbani, et al., “Characterization of Tor traffic using time-based features,” 2017 The 3nd International Conference on Information Systems Security and Privacy (ICISSP 2017), pp. 253-262, 2017.
[44] The Tcpdump Group, “Tcpdump” Accessed on May 20, 2023. [Online]. Available: https://www.tcpdump.org/
[45] R. Chandra, K. Chaudhary, and A. Kumar, “Comparison of data normalization for wine classification using K-NN algorithm,” 2022 International Journal of Informatics and Information Systems, vol. 5, no. 4, pp. 175-180, 2022.
[46] Wikipedia, “Confusion matrix” Accessed on May 25, 2023. [Online]. Available: https://en.wikipedia.org/wiki/Confusion_matrix
[47] NumFOCUS Inc, “Pandas” Accessed on May 26 2023. [Online]. Available: https://pandas.pydata.org/
[48] NumPy, “NumPy” Accessed on May 26 2023. [Online]. Available: https://numpy.org/citing-numpy/
[49] Keras, “Keras” Accessed on May 26 2023. [Online]. Available: https://keras.io/
[50] NVIDIA Corporation, “CUDA Toolkit” Accessed on May 26 2023. [Online]. Available: https://developer.nvidia.com/cuda-toolkit
[51] NVIDIA Corporation, “NVIDIA cuDNN” Accessed on May 26 2023. [Online]. Available: https://developer.nvidia.com/cudnn
[52] Simon Blanke, “Hyperactive” Accessed on May 26 2023. [Online]. Available: https://github.com/SimonBlanke/Hyperactive#citing-hyperactive
[53] F. S. Nahm, “Receiver operating characteristic curve: overview and practical use for clinicians,” 2022 Korean Journal of Anesthesiology, vol. 75, no. 1, pp. 25-36, 2022.
[54] M. Hosseini Shirvani and A. Akbarifar, “A comparative study on anonymizing networks: TOR, I2P, and riffle networks comparison,” 2022 Journal of Electrical and Computer Engineering Innovations (JECEI), vol. 10, no. 2, pp. 259-272, 2022.
[55] Vultr.com, “ZeroNet” Accessed on June 5 2023. [Online]. Available: https://zeronet.io/
[56] E. Figueras-Martín, R. Magán-Carrión, and J. Boubeta-Puig, “Drawing the web structure and content analysis beyond the Tor darknet: Freenet as a case of study,” 2022 Journal of Information Security and Applications, vol. 68, p. 103229, 2022.
[57] R. Zuech, J. Hancock, and T. M. Khoshgoftaar, “Detecting web attacks using random undersampling and ensemble learners,”2021 Journal of Big Data, vol. 8, no. 1, pp. 1-20, 2021.
[58] N. Chakrabarty and S. Biswas, “Navo minority over-sampling technique (NMOTe): a consistent performance booster on imbalanced datasets,”2020 Journal of Electronics, vol. 2, no. 02, pp. 96-136, 2020.
[59] H. Hewamalage, C. Bergmeir, and K. Bandara, “Recurrent neural networks for time series forecasting: current status and future directions,”2021 International Journal of Forecasting, vol. 37, no. 1, pp. 388-427, 2021.
[60] M. Vishwakarma and N. Kesswani, “DIDS: A deep neural network based real-time intrusion detection system for IoT,”2022 Decision Analytics Journal, vol. 5, p. 100142, 2022. |