참고문헌
- A. Verma and V. Ranga, "Machine Learning Based Intrusion Detection Systems for IoT Applications," Wirel. Pers. Commun., vol. 111, no. 4, pp. 2287-2310, 2020. https://doi.org/10.1007/s11277-019-06986-8
- J. Li, Z. Zhao, R. Li, and H. Zhang, "AI-based two-stage intrusion detection for software defined IoT networks," IEEE Internet Things J., vol. 6, no. 2, pp. 2093-2102, 2019. https://doi.org/10.1109/jiot.2018.2883344
- S. Anindita, S. R. Chatterjee, and M. Chakraborty, "Role of Cryptography in Network Security," in The "Essence" of Network Security: An End-to-End Panorama, 2021, pp. 103-143.
- A. V. Elijah, A. Abdullah, N. Z. JhanJhi, M. Supramaniam, B. A. O, and O. Balogun Abdullateef, "Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: An empirical study," Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 9, pp. 520-528, 2019.
- Y. A. Alsariera, V. E. Adeyemo, A. O. Balogun, and A. K. Alazzawi, "AI Meta-Learners and Extra-Trees Algorithm for the Detection of Phishing Websites," IEEE Access, vol. 8, no. August, pp. 142532-142542, 2020. https://doi.org/10.1109/ACCESS.2020.3013699
- A. Alsadhan et al., "Locally weighted classifiers for detection of neighbor discovery protocol distributed denial-of-service and replayed attacks," Trans. Emerg. Telecommun. Technol., no. June, pp. 1-15, 2019.
- F. Feng, X. Liu, B. Yong, R. Zhou, and Q. Zhou, "Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device," Ad Hoc Networks, vol. 84, pp. 82-89, 2019. https://doi.org/10.1016/j.adhoc.2018.09.014
- Y. Xin et al., "Machine Learning and Deep Learning Methods for Cybersecurity," IEEE Access, vol. 6, pp. 35365-35381, 2018. https://doi.org/10.1109/ACCESS.2018.2836950
- M. Nawir, A. Amir, N. Yaakob, and O. N. G. B. I. Lynn, "Multi-Classification of Unsw-Nb15 Dataset for Network Anomaly Detection System," J. Theor. Appl. Inf. Technol., vol. 96, no. 15, pp. 5094-5104, 2018.
- T. Salman, D. Bhamare, A. Erbad, R. Jain, and M. Samaka, "Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments," Proc. - 4th IEEE Int. Conf. Cyber Secur. Cloud Comput. CSCloud 2017 3rd IEEE Int. Conf. Scalable Smart Cloud, SSC 2017, pp. 97-103, 2017.
- V. Kumar, D. Sinha, A. K. Das, S. C. Pandey, and R. T. Goswami, "An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset," Cluster Comput., vol. 23, no. 2, pp. 1397-1418, 2020. https://doi.org/10.1007/s10586-019-03008-x
- O. O. Olasehinde, "A Stacked Ensemble Intrusion Detection Approach for the Protection of Information System," Int. J. Infomation Secur. Res., vol. 10, no. 1, pp. 910-923, 2020. https://doi.org/10.20533/ijisr.2042.4639.2020.0105
- Y. A. Alsariera, "Detecting Generic Network Intrusion Attacks using Tree-based Machine Learning Methods," Int. J. Adv. Comput. Sci. Appl., vol. 12, no. 2, pp. 597-603, 2021.
- N. Moustafa and J. Slay, "UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in 2015 Military Communications and Information Systems Conference, MilCIS 2015 - Proceedings IEEE, 2015, pp. 1-6.
- T. Hamed, J. B. Ernst, and S. C. Kremer, "A Survey and Taxonomy of Classifiers of Intrusion Detection Systems," 2018, pp. 21-39.
- S. Lee and C. H. Jun, "Fast incremental learning of logistic model tree using least angle regression," Expert Syst. Appl., vol. 97, pp. 137-145, 2018. https://doi.org/10.1016/j.eswa.2017.12.014
- T. D. Pham, D. T. Bui, K. Yoshino, and N. N. Le, "Optimized rule-based logistic model tree algorithm for mapping mangrove species using ALOS PALSAR imagery and GIS in the tropical region," Environ. Earth Sci., vol. 77, no. 5, p. 159, 2018. https://doi.org/10.1007/s12665-018-7373-y
- R. Kohavi, "Scaling Up the Accuracy of Naive-Bayes Classi ers : a Decision-Tree Hybrid Accuracy Scale-Up : the Learning," Kdd, vol. 96, pp. 202-207, 1996.
- N. Landwehr, M. Hall, and E. Frank, "Logistic model trees," Mach. Learn., vol. 59, no. 1-2, pp. 161-205, 2005. https://doi.org/10.1007/s10994-005-0466-3
- Y. A. Alsariera, A. V. Elijah, and A. O. Balogun, "Phishing Website Detection: Forest by Penalizing Attributes Algorithm and Its Enhanced Variations," Arab. J. Sci. Eng., vol. 45, no. 12, pp. 10459-10470, 2020. https://doi.org/10.1007/s13369-020-04802-1
- Y. A. Alsariera, "Detecting Generic Network Intrusion Attacks using Tree-based Machine Learning Methods," Inter. J. of Adv. Comp. & Science and Applications., vol. 12, no. 2, pp. 597-603, 2021.