• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

相似文献

1
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBERSECURITY.网络安全中用于入侵检测系统的数据聚类应用调查
Int J Netw Secur Appl. 2020 Jan;12(1):1-18. doi: 10.5121/ijnsa.2020.12101.
2
A secure edge computing model using machine learning and IDS to detect and isolate intruders.一种使用机器学习和入侵检测系统来检测和隔离入侵者的安全边缘计算模型。
MethodsX. 2024 Feb 13;12:102597. doi: 10.1016/j.mex.2024.102597. eCollection 2024 Jun.
3
Comprehensive analysis and recommendation of feature evaluation measures for intrusion detection.入侵检测特征评估措施的综合分析与建议
Heliyon. 2020 Jul 9;6(7):e04262. doi: 10.1016/j.heliyon.2020.e04262. eCollection 2020 Jul.
4
Intrusion Detection in Vehicle Controller Area Network (CAN) Bus Using Machine Learning: A Comparative Performance Study.基于机器学习的车载控制器局域网 (CAN) 总线入侵检测:性能比较研究。
Sensors (Basel). 2023 Mar 30;23(7):3610. doi: 10.3390/s23073610.
5
Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method.基于集成树和 SHAP 方法的入侵检测系统分类与解释。
Sensors (Basel). 2022 Feb 3;22(3):1154. doi: 10.3390/s22031154.
6
Research of Machine Learning Algorithms for the Development of Intrusion Detection Systems in 5G Mobile Networks and Beyond.机器学习算法在 5G 及未来移动通信网络入侵检测系统中的研究
Sensors (Basel). 2022 Dec 17;22(24):9957. doi: 10.3390/s22249957.
7
A Continuous Learning Approach for Real-Time Network Intrusion Detection.一种用于实时网络入侵检测的持续学习方法。
Int J Neural Syst. 2021 Dec;31(12):2150060. doi: 10.1142/S012906572150060X. Epub 2021 Nov 13.
8
In-vehicle network intrusion detection systems: a systematic survey of deep learning-based approaches.车载网络入侵检测系统:基于深度学习方法的系统综述
PeerJ Comput Sci. 2023 Oct 26;9:e1648. doi: 10.7717/peerj-cs.1648. eCollection 2023.
9
Study of Machine Learning for Cloud Assisted IoT Security as a Service.机器学习在云辅助物联网安全即服务中的应用研究。
Sensors (Basel). 2021 Feb 3;21(4):1034. doi: 10.3390/s21041034.
10
On the Application of Entropy Measures with Sliding Window for Intrusion Detection in Automotive In-Vehicle Networks.基于滑动窗口的熵度量在汽车车载网络入侵检测中的应用
Entropy (Basel). 2020 Sep 18;22(9):1044. doi: 10.3390/e22091044.

引用本文的文献

1
A Modified ResNeXt for Android Malware Identification and Classification.一种用于 Android 恶意软件识别和分类的改进型 ResNeXt。
Comput Intell Neurosci. 2022 May 20;2022:8634784. doi: 10.1155/2022/8634784. eCollection 2022.

网络安全中用于入侵检测系统的数据聚类应用调查

A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBERSECURITY.

作者信息

Bohara Binita, Bhuyan Jay, Wu Fan, Ding Junhua

机构信息

Dept.of Computer Science, Tuskegee University, Tuskegee, AL, USA.

Dept.of Information Science, University of North Texas, Texas, USA.

出版信息

Int J Netw Secur Appl. 2020 Jan;12(1):1-18. doi: 10.5121/ijnsa.2020.12101.

DOI:10.5121/ijnsa.2020.12101
PMID:34290487
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8289996/
Abstract

In the present world, it is difficult to realize any computing application working on a standalone computing device without connecting it to the network. A large amount of data is transferred over the network from one device to another. As networking is expanding, security is becoming a major concern. Therefore, it has become important to maintain a high level of security to ensure that a safe and secure connection is established among the devices. An intrusion detection system (IDS) is therefore used to differentiate between the legitimate and illegitimate activities on the system. There are different techniques are used for detecting intrusions in the intrusion detection system. This paper presents the different clustering techniques that have been implemented by different researchers in their relevant articles. This survey was carried out on 30 papers and it presents what different datasets were used by different researchers and what evaluation metrics were used to evaluate the performance of IDS. This paper also highlights the pros and cons of each clustering technique used for IDS, which can be used as a basis for future work.

摘要

在当今世界,很难实现任何一个独立的计算设备在不连接网络的情况下运行计算应用程序。大量的数据通过网络从一个设备传输到另一个设备。随着网络的不断扩展,安全正成为一个主要问题。因此,保持高度的安全性以确保在设备之间建立安全可靠的连接变得至关重要。因此,入侵检测系统(IDS)被用于区分系统上的合法和非法活动。在入侵检测系统中使用了不同的技术来检测入侵。本文介绍了不同研究人员在其相关文章中实现的不同聚类技术。这项调查是在30篇论文上进行的,它展示了不同研究人员使用了哪些不同的数据集,以及使用了哪些评估指标来评估IDS的性能。本文还强调了用于IDS的每种聚类技术的优缺点,这可以作为未来工作的基础。