共 52 条
[1]
(2020)
[2]
Lukaseder T., Security in High-bandwidth Networks, (2020)
[3]
Gilder G., Afterword: The twenty laws of the telecosm, TELECOSM: How Infinite Bandwidth Will Revolutionize Our World, pp. 265-271, (2000)
[4]
Sommer R., Paxson V., Outside the closed world: On using machine learning for network intrusion detection, Proc. IEEE Symp. Secur. Privacy, pp. 305-316, (2010)
[5]
Zeek Cluster Architecture
[6]
Snort Intrusion Detection/prevention System
[7]
Zeek Network Security Monitor
[8]
Mai J., Chuah C., Sridharan A., Ye T., Zang H., Is sampled data sufficient for anomaly detection?, Proc. 6th ACM SIGCOMM Conf. Internet Meas., pp. 165-176, (2006)
[9]
Shiravi A., Shiravi H., Tavallaee M., Ghorbani A., Toward developing a systematic approach to generate benchmark datasets for intrusion detection, Comput. Secur., 31, 3, pp. 357-374, (2012)
[10]
Sharafaldin I., Lashkari A.H., Ghorbani A., Toward generating a new intrusion detection dataset and intrusion traffic characterization, Proc. 4th Int. Conf. Inf. Syst. Secur. Privacy, pp. 108-116, (2018)