-
Notifications
You must be signed in to change notification settings - Fork 0
/
references.bib
343 lines (308 loc) · 12.8 KB
/
references.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
@article{adadi2018peeking,
title = {Peeking inside the black-box: a survey on explainable artificial intelligence (XAI)},
author = {Adadi, Amina and Berrada, Mohammed},
journal = {IEEE access},
volume = {6},
pages = {52138--52160},
year = {2018},
publisher = {IEEE}
}
@inproceedings{aksu2018detecting,
title = {Detecting port scan attempts with comparative analysis of deep learning and support vector machine algorithms},
author = {Aksu, Dogukan and Aydin, M Ali},
booktitle = {2018 International congress on big data, deep learning and fighting cyber terrorism (IBIGDELFT)},
pages = {77--80},
year = {2018},
organization = {IEEE}
}
@inproceedings{amarasinghe2018toward,
title = {Toward explainable deep neural network based anomaly detection},
author = {Amarasinghe, Kasun and Kenney, Kevin and Manic, Milos},
booktitle = {2018 11th international conference on human system interaction (HSI)},
pages = {311--317},
year = {2018},
organization = {IEEE}
}
@inproceedings{arp2022and,
title = {Dos and don'ts of machine learning in computer security},
author = {Arp, Daniel and Quiring, Erwin and Pendlebury, Feargus and Warnecke, Alexander and Pierazzi, Fabio and Wressnegger, Christian and Cavallaro, Lorenzo and Rieck, Konrad},
booktitle = {31st USENIX Security Symposium (USENIX Security 22)},
pages = {3971--3988},
year = {2022}
}
@misc{bcs2021code,
title = {BCS Code of Conduct},
author = {{British Computer Society}},
howpublished = {\url{https://www.bcs.org/media/2211/bcs-code-of-conduct.pdf}}
}
@article{belouch2018performance,
title = {Performance evaluation of intrusion detection based on machine learning using Apache Spark},
author = {Belouch, Mustapha and El Hadaj, Salah and Idhammad, Mohamed},
journal = {Procedia Computer Science},
volume = {127},
pages = {1--6},
year = {2018},
publisher = {Elsevier}
}
@inproceedings{bhavani2019network,
title = {Network intrusion detection system using random forest and decision tree machine learning techniques},
author = {Bhavani, T Tulasi and Rao, M Kameswara and Reddy, A Manohar},
booktitle = {First International Conference on Sustainable Technologies for Computational Intelligence: Proceedings of ICTSCI 2019},
pages = {637--643},
year = {2019},
organization = {Springer}
}
@article{buczak2015survey,
title = {A survey of data mining and machine learning methods for cyber security intrusion detection},
author = {Buczak, Anna L and Guven, Erhan},
journal = {IEEE Communications surveys \& tutorials},
volume = {18},
number = {2},
pages = {1153--1176},
year = {2015},
publisher = {IEEE}
}
@article{chowdhury2017botnet,
title = {Botnet detection using graph-based feature clustering},
author = {Chowdhury, Sudipta and Khanzadeh, Mojtaba and Akula, Ravi and Zhang, Fangyan and Zhang, Song and Medal, Hugh and Marufuzzaman, Mohammad and Bian, Linkan},
journal = {Journal of Big Data},
volume = {4},
pages = {1--23},
year = {2017},
publisher = {Springer}
}
@misc{CICIDS2017download,
title = {CICIDS2017 CSV Files},
author = {Sharafaldin, Iman and Lashkari, Arash Habibi and Ghorbani, Ali A and others},
howpublished = {\url{http://205.174.165.80/CICDataset/CIC-IDS-2017/}}
}
@article{cortes1995support,
title = {Support-vector networks},
author = {Cortes, Corinna and Vapnik, Vladimir},
journal = {Machine learning},
volume = {20},
pages = {273--297},
year = {1995},
publisher = {Springer}
}
@misc{CTU13download,
title = {CTU13 CSV Files},
author = {Faisal Malik},
howpublished = {\url{https://github.com/imfaisalmalik/CTU13-CSV-Dataset}}
}
@inproceedings{engelen2021troubleshooting,
title = {Troubleshooting an intrusion detection dataset: the CICIDS2017 case study},
author = {Engelen, Gints and Rimmer, Vera and Joosen, Wouter},
booktitle = {2021 IEEE Security and Privacy Workshops (SPW)},
pages = {7--12},
year = {2021},
organization = {IEEE}
}
@article{farnaaz2016random,
title = {Random forest modeling for network intrusion detection system},
author = {Farnaaz, Nabila and Jabbar, MA},
journal = {Procedia Computer Science},
volume = {89},
pages = {213--217},
year = {2016},
publisher = {Elsevier}
}
@article{garcia2014empirical,
title = {An empirical comparison of botnet detection methods},
author = {Garcia, Sebastian and Grill, Martin and Stiborek, Jan and Zunino, Alejandro},
journal = {computers \& security},
volume = {45},
pages = {100--123},
year = {2014},
publisher = {Elsevier}
}
@article{hastie2009random,
title = {Random forests},
author = {Hastie, Trevor and Tibshirani, Robert and Friedman, Jerome and Hastie, Trevor and Tibshirani, Robert and Friedman, Jerome},
journal = {The elements of statistical learning: Data mining, inference, and prediction},
pages = {587--604},
year = {2009},
publisher = {Springer}
}
@article{kabir2017network,
title = {A network intrusion detection framework based on Bayesian network using wrapper approach},
author = {Kabir, Md Reazul and Onik, Abdur Rahman and Samad, Tanvir},
journal = {International Journal of Computer Applications},
volume = {166},
number = {4},
pages = {13--17},
year = {2017},
publisher = {Foundation of Computer Science}
}
@inproceedings{kim2003network,
title = {Network-based intrusion detection with support vector machines},
author = {Kim, Dong Seong and Park, Jong Sou},
booktitle = {Information Networking: International Conference, ICOIN 2003, Cheju Island, Korea, February 12-14, 2003. Revised Selected Papers},
pages = {747--756},
year = {2003},
organization = {Springer}
}
@inproceedings{lashkari2017characterization,
author = {Habibi Lashkari, Arash and Abdul kadir, Andi Fitriah and Gonzalez, Hugo and Mbah, Kenneth and Ghorbani, Ali},
year = {2017},
month = {08},
pages = {233-23309},
title = {Towards a Network-Based Framework for Android Malware Detection and Characterization},
booktitle = {Towards a Network-Based Framework for Android Malware Detection and Characterization},
doi = {10.1109/PST.2017.00035}
}
@article{lundberg2017unified,
title = {A unified approach to interpreting model predictions},
author = {Lundberg, Scott M and Lee, Su-In},
journal = {Advances in neural information processing systems},
volume = {30},
year = {2017}
}
@article{mane2021explaining,
title = {Explaining network intrusion detection system using explainable AI framework},
author = {Mane, Shraddha and Rao, Dattaraj},
journal = {arXiv preprint arXiv:2103.07110},
year = {2021}
}
@article{marchetti2016analysis,
title = {Analysis of high volumes of network traffic for advanced persistent threat detection},
author = {Marchetti, Mirco and Pierazzi, Fabio and Colajanni, Michele and Guido, Alessandro},
journal = {Computer Networks},
volume = {109},
pages = {127--141},
year = {2016},
publisher = {Elsevier}
}
@article{pedregosa2011scikit,
title = {Scikit-learn: Machine learning in Python},
author = {Pedregosa, Fabian and Varoquaux, Ga{\"e}l and Gramfort, Alexandre and Michel, Vincent and Thirion, Bertrand and Grisel, Olivier and Blondel, Mathieu and Prettenhofer, Peter and Weiss, Ron and Dubourg, Vincent and others},
journal = {the Journal of machine Learning research},
volume = {12},
pages = {2825--2830},
year = {2011},
publisher = {JMLR. org}
}
@article{pektacs2019deep,
title = {A deep learning method to detect network intrusion through flow-based features},
author = {Pekta{\c{s}}, Abdurrahman and Acarman, Tankut},
journal = {International Journal of Network Management},
volume = {29},
number = {3},
pages = {e2050},
year = {2019},
publisher = {Wiley Online Library}
}
@inproceedings{pierazzi2020intriguing,
title = {Intriguing properties of adversarial ml attacks in the problem space},
author = {Pierazzi, Fabio and Pendlebury, Feargus and Cortellazzi, Jacopo and Cavallaro, Lorenzo},
booktitle = {2020 IEEE symposium on security and privacy (SP)},
pages = {1332--1349},
year = {2020},
organization = {IEEE}
}
@misc{RAPIDSdownload,
title = {RAPIDS download Link},
author = {RAPIDS AI},
howpublished = {\url{https://docs.rapids.ai/install}}
}
@article{raschka2020machine,
title = {Machine Learning in Python: Main developments and technology trends in data science, machine learning, and artificial intelligence},
author = {Raschka, Sebastian and Patterson, Joshua and Nolet, Corey},
journal = {arXiv preprint arXiv:2002.04803},
year = {2020}
}
@article{saranya2020performance,
title = {Performance analysis of machine learning algorithms in intrusion detection system: A review},
author = {Saranya, T and Sridevi, S and Deisy, C and Chung, Tran Duc and Khan, MKA Ahamed},
journal = {Procedia Computer Science},
volume = {171},
pages = {1251--1260},
year = {2020},
publisher = {Elsevier}
}
@book{scholkopf2002learning,
title = {Learning with kernels: support vector machines, regularization, optimization, and beyond},
author = {Sch{\"o}lkopf, Bernhard and Smola, Alexander J},
year = {2002},
publisher = {MIT press}
}
@article{scikit-learn,
title = {Scikit-learn: Machine Learning in {P}ython},
author = {Pedregosa, F. and Varoquaux, G. and Gramfort, A. and Michel, V.
and Thirion, B. and Grisel, O. and Blondel, M. and Prettenhofer, P.
and Weiss, R. and Dubourg, V. and Vanderplas, J. and Passos, A. and
Cournapeau, D. and Brucher, M. and Perrot, M. and Duchesnay, E.},
journal = {Journal of Machine Learning Research},
volume = {12},
pages = {2825--2830},
year = {2011}
}
@article{sharafaldin2018toward,
title = {Toward generating a new intrusion detection dataset and intrusion traffic characterization.},
author = {Sharafaldin, Iman and Lashkari, Arash Habibi and Ghorbani, Ali A and others},
journal = {ICISSp},
volume = {1},
pages = {108--116},
year = {2018}
}
@inproceedings{shrivastav2010network,
title = {Network traffic classification using semi-supervised approach},
author = {Shrivastav, Amita and Tiwari, Aruna},
booktitle = {2010 Second International Conference on Machine Learning and Computing},
pages = {345--349},
year = {2010},
organization = {IEEE}
}
@article{sokolova2009systematic,
title = {A systematic analysis of performance measures for classification tasks},
author = {Sokolova, Marina and Lapalme, Guy},
journal = {Information processing \& management},
volume = {45},
number = {4},
pages = {427--437},
year = {2009},
publisher = {Elsevier}
}
@inproceedings{sommer2010outside,
title = {Outside the closed world: On using machine learning for network intrusion detection},
author = {Sommer, Robin and Paxson, Vern},
booktitle = {2010 IEEE symposium on security and privacy},
pages = {305--316},
year = {2010},
organization = {IEEE}
}
@article{stiawan2020cicids,
title = {CICIDS-2017 dataset feature analysis with information gain for anomaly detection},
author = {Stiawan, Deris and Idris, Mohd Yazid Bin and Bamhdi, Alwi M and Budiarto, Rahmat and others},
journal = {IEEE Access},
volume = {8},
pages = {132911--132921},
year = {2020},
publisher = {IEEE}
}
@article{teng2017svm,
title = {SVM-DT-based adaptive and collaborative intrusion detection},
author = {Teng, Shaohua and Wu, Naiqi and Zhu, Haibin and Teng, Luyao and Zhang, Wei},
journal = {IEEE/CAA Journal of Automatica Sinica},
volume = {5},
number = {1},
pages = {108--118},
year = {2017},
publisher = {IEEE}
}
@inproceedings{ustebay2018intrusion,
title = {Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier},
author = {Ustebay, Serpil and Turgut, Zeynep and Aydin, Muhammed Ali},
booktitle = {2018 international congress on big data, deep learning and fighting cyber terrorism (IBIGDELFT)},
pages = {71--76},
year = {2018},
organization = {IEEE}
}
@inproceedings{warnecke2020evaluating,
title = {Evaluating explanation methods for deep learning in security},
author = {Warnecke, Alexander and Arp, Daniel and Wressnegger, Christian and Rieck, Konrad},
booktitle = {2020 IEEE european symposium on security and privacy (EuroS\&P)},
pages = {158--174},
year = {2020},
organization = {IEEE}
}