과제정보
The authors would like to express their deep thanks to Dr. John Mike for his valuable advice.
참고문헌
- Shirazi, "Evaluation of anomaly detection techniques for scada communication resilience," IEEE Resilience Week, 2016.
- N. Mirai, "mirai-botnet," 2016. [Online]. Available: https://www.cyber.nj.gov/threat-profiles/botnetvariants/mirai-botnet. [Accessed 31 December 2019].
- H. Zhou, B. Liu and D. Wang, "Design and research of urban intelligent transportation system based on the Internet of Things," Internet of Things, pp. 572-580, 2012.
- S. Lim, S. Yang and Y. Kim, "Controller scheduling for continued SDN operation under DDoS attacks," Electronic Letter, pp. 1259-1261, 2015.
- A. Buck and E. Govan, "A survey of data mining and machine learning methods for cyber security intrusion detection," IEEE Communications Surveys & Tutorials, vol. 18.2, 2016.
- P. Baldi, "Autoencoders, Unsupervised Learning, and Deep Architectures," Proceedings of ICML works hop nuns supervised transfer learning, 2012.
- R. Doshi, N. Althorp and N. Feemster, "Machine Learning DDoS Detection for Consumer Internet of Things Devices," IEEE Deep Learning and Security Workshop, 2018.
- Q. Yan, F. Yu and Q. Gong, "Software defined networking and Distributed denial of service attacks in cloud computing environments," IEEE Communications Survey & Tutorial, no. 18, pp. 602-622, 2016.
- N. Z. Bawany, J. A. Shamsi and K. Salah, "DDoS Attack Detection and Mitigation Using SDN," Arabian Journal for Science & Engineering, no. 2, pp. 1-19, 2017.
- B. Kang and H. Choo, "An SDN-enhanced load-balancing technique in the cloud system[J].," Journal of Supercomputing, pp. 1-24, 2016.
- O. Saniya and D. M. Choo, "Distributed denial of service (DDOS) resilience in cloud," Journal of Network & Computer Applications, pp. 147-165, 2016.
- H. Luo, Z. Chen and J. Li, "Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers[J]," IEEE Transactions on Information Forensics & Security, pp. 1801-1815, 2017.
- U. Dick and T. Schiffer, "Learning to control a structured-prediction decoder for detection of HTTP-layer DDOS attackers," in Machine Learning, 2016, pp. 1-26.
- Z. Gao and N. Ansari, "Differentiating Malicious DDoS Attack Traffic from Normal TCP Flows by Proactive Tests[J]," Communications Letters IEEE, pp. 793-795, 2006.
- K. Briceno, A. Rurality and A. Gurov, "Detecting the Origin of DDoS Attacks in OpenStack Cloud Platform Using Data Mining Techniques[M]// Internet of Things," Smart Spaces, and Next Generation Networks and Systems, 2016.
- N. Hoque, D. Bhattacharyya and J. Kavita, "Botnet in DDoS Attacks: Trends and Challenges[J]," IEEE Communications Surveys & Tutorials, pp. 1-1, 2015.
- A. Saeed, R. E. Overbill and T. Ridzik, "Detection of known and unknown DDOS attacks using Artificial Neural Networks," Neurocomputing, pp. 385-393, 2016.
- S. Rama nauseate, N. Geranin and A. Cents, "Modelling influence of Botnet features on effectiveness of DDoS attacks[J]," Security & Communication Networks, pp. 2090-2101, 2015.
- C. Barghini, M. J. Kavita, S. Singh and D. K. Bhattacharyya, "Anomaly based DDoS attack detection," International Journal of Computer Applications, pp. 35-40, 2015.
- A. Aggarwal and A. Gupta, "Survey on data mining and IP traceback technique in DDos attack," International Journal of Engineering and computer science, vol. 4(6), pp. 12595-12598, 2015.
- G. Naima and M. Hemal Atha, "Effective approach towards intrusion detection system using data mining technique," Egyptian Informatics Journal, vol. 15(1), pp. 37-50, 2014. https://doi.org/10.1016/j.eij.2013.10.003
- Y. A. Mahmood, "Autoencoder-based feature learning for cybersecurity applications," International Joint Conference on Neural Networks (IJCNN), 2017.
- S. Yadav and S. Subramanian, "Detection of Application Layer DDoS attack by feature learning using Stacked Auto Encoder," International Conference on Computational (ICCTICT), 2016.
- A. Fischer and C. Ige, "An introduction to restricted Boltzmann machines. In Libero American congress on pattern recognition," Springer, Berlin, Heidelberg, pp. 14-36, 2012.
- V. G. Rydin and G. Volcano, "An expectation maximization method to estimate a rank-based," 2017.
- D. Ferrierite, "Extreme Dimensionality Reduction for Network Attack Visualization with Autoencoders," (IJCNN), 2019.
- I. Sharfuddin, A. H. Lashkar, S. Haka and A. Ghobadi, "Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy," International caravan conference on security (ICCST). IEEE, pp. 1-8, 2019.
- Y. Maidan, M. Bandana, Y. Mathur, Y. Mirsky and Shabtai, "Network based detection of iot botnet attacks using deep autoencoders," IEEE Pervasive Computing, pp. 12-22, 17(3).
- C. Elkan, "Using the triangle inequality to accelerate k-means," ICML-03, pp. 147-153, 2003.
- R. Bhatia, S. Benno, J. Esteban, T. V. Lakshman and J. Grogan, "Unsupervised machine learning for network-centric anomaly detection in IoT.," in the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks.