CLC number: TP393.08
On-line Access: 2023-08-29
Received: 2022-07-21
Revision Accepted: 2022-12-11
Crosschecked: 2023-08-29
Cited: 0
Clicked: 835
Citations: Bibtex RefMan EndNote GB/T7714
Jie CHEN, Dandan WU, Ruiyun XIE. Artificial intelligence algorithms for cyberspace security applications: a technological and status review[J]. Frontiers of Information Technology & Electronic Engineering,in press.https://doi.org/10.1631/FITEE.2200314 @article{title="Artificial intelligence algorithms for cyberspace security applications: a technological and status review", %0 Journal Article TY - JOUR
人工智能算法在网络空间安全中的应用:技术与现状综述1西北工业大学网络空间安全学院,中国西安市,710000 2中国电子科技网络信息安全有限公司,中国成都市,610000 摘要:网络空间安全急需解决的3个技术问题是:网络攻击检测的及时性和准确性、安全态势的可信评估和预测以及安全防御策略优化的有效性。人工智能算法已成为网络安全应用增加安全机会和提高对抗能力的核心手段。近年来,人工智能技术的突破和应用为提高网络防御能力提供了先进的技术支持。本综述对2017至2022年间人工智能技术在网络空间安全领域的最新应用进行了全面回顾。参考文献来源于各种期刊和会议,其中52.68%的论文来自Elsevier、Springer和IEEE期刊,25%来自国际学术会议。本综述重点介绍了机器学习、深度学习和一些流行的优化算法在该领域的最新应用进展,对算法模型的特点、性能结果、数据集、以及潜在的优点和局限性进行了分析,强调了现存的挑战。本工作旨在为想进一步挖掘人工智能技术在网络空间安全领域应用的潜力、解决特定网络空间安全问题的研究人员提供技术指导,掌握当前技术和应用的发展趋势以及网络安全领域的热点问题。同时,本综述对当前面临的挑战提供了有效应对策略和方向。 关键词组: Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article
Reference[1]Aggarwal P, Thakoor O, Jabbari S, et al., 2022. Designing effective masking strategies for cyberdefense through human experimentation and cognitive models. Comput Secur, 117:102671. [2]Al-Garadi MA, Mohamed A, Al-Ali AK, et al., 2020. A survey of machine and deep learning methods for Internet of Things (IoT) security. IEEE Commun Surv Tut, 22(3):1646-1685. [3]Al-Omari M, Rawashdeh M, Qutaishat F, et al., 2021. An intelligent tree-based intrusion detection model for cyber security. J Netw Syst Manag, 29(2):20. [4]Al-Yaseen WL, Othman ZA, Nazri MZA, 2017. Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst Appl, 67:296-303. [5]Andresini G, Appice A, di Mauro N, et al., 2020. Multi-channel deep feature learning for intrusion detection. IEEE Access, 8:53346-53359. [6]Apruzzese G, Colajanni M, Ferretti L, et al., 2018. On the effectiveness of machine and deep learning for cyber security. Proc 10th Int Conf on Cyber Conflict, p.371-390. [7]Arshad SA, Murtaza MA, Tahir M, 2012. Fair buffer allocation scheme for integrated wireless sensor and vehicular networks using Markov decision processes. IEEE Vehicular Technology Conf, p.1-5. [8]Atefi K, Hashim H, Kassim M, 2019. Anomaly analysis for the classification purpose of intrusion detection system with K-nearest neighbors and deep neural network. IEEE 7th Conf on Systems, Process and Control, p.269-274. [9]Aung YY, Min MM, 2018. Hybrid intrusion detection system using K-means and K-nearest neighbors algorithms. Proc IEEE/ACIS 17th Int Conf on Computer and Information Science, p.34-38. [10]Bahnsen AC, Torroledo I, Camacho LD, et al., 2018. Simulating malicious AI. Proc Symp on Electronic Crime Research, p.15-17. [11]Balamurugan E, Mehbodniya A, Kariri E, et al., 2022. Network optimization using defender system in cloud computing security based intrusion detection system with game theory deep neural network (IDSGT-DNN). Patt Recogn Lett, 156:142-151. [12]Bdrany A, Sadkhan SB, 2020. Decision making approaches in cognitive radio—status, challenges and future trends. Int Conf on Advanced Science and Engineering, p.195-198. [13]Berman DS, Buczak NL, Chavis JS, et al., 2019. A survey of deep learning methods for cyber security. Information, 10(4):122. [14]Bhuiyan TH, Medal HR, Nandi AK, et al., 2021. Risk-averse bi-level stochastic network interdiction model for cyber-security risk management. Int J Crit Infrastr Prot, 32:100408. [15]Bitaab M, Hashemi S, 2017. Hybrid intrusion detection: combining decision tree and Gaussian mixture model. Proc 14th Int ISC (Iranian Society of Cryptology) Conf on Information Security and Cryptology, p.8-12. [16]Bouhamed O, Bouachir O, Aloqaily M, et al., 2021. Lightweight IDS for UAV networks: a periodic deep reinforcement learning-based approach. IFIP/IEEE Int Symp on Integrated Network Management, p.1032-1037. [17]Bresniker K, Gavrilovska A, Holt J, et al., 2019. Grand challenge: applying artificial intelligence and machine learning to cybersecurity. Computer, 52(12):45-52. [18]Buczak AL, Guven E, 2016. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tut, 18(2):1153-1176. [19]Burke D, 1999. Toward a Game Theory Model of Information Warfare. Technical Report, AFIT/GSS/LAL/99D-1. Airforce Institute of Technology, USA. [20]Buşoniu L, Babuška R, de Schutter B, 2010. Multi-agent reinforcement learning: an overview. In: Srinivasan D, Jain LC (Eds.), Innovations in Multi-agent Systems and Applications. Springer, Heidelberg, p.183-221. [21]Cao G, Lu ZM, Wen XM, et al., 2018. AIF: an artificial intelligence framework for smart wireless network management. IEEE Commun Lett, 22(2):400-403. [22]Challita U, Dong L, Saad W, 2018. Proactive resource management for LTE in unlicensed spectrum: a deep learning perspective. IEEE Trans Wirel Commun, 17(7):4674-4689. [23]Chen F, Ye ZW, Wang CZ, et al., 2018. A feature selection approach for network intrusion detection based on tree-seed algorithm and K-nearest neighbor. IEEE 4th Int Symp on Wireless Systems within the Int Conf on Intelligent Data Acquisition and Advanced Computing Systems, p.68-72. [24]Chen SS, Lian YF, Jia W, 2008. A network vulnerability evaluation method based on Bayesian networks. J Univ Chin Acad Sci, 25(5):639-648(in Chinese). [25]Chen Y, Lin QZ, Wei WH, et al., 2022. Intrusion detection using multi-objective evolutionary convolutional neural network for Internet of Things in fog computing. Knowl-Based Syst, 244:108505. [26]Chohra A, Shirani P, Karbab EB, et al., 2022. Chameleon: optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection. Comput Secur, 117:102684. [27]Choi YH, Liu P, Shang ZT, et al., 2020. Using deep learning to solve computer security challenges: a survey. Cybersecurity, 3(1):15. [28]Deng SG, Xiang ZZ, Zhao P, et al., 2020. Dynamical resource allocation in edge for trustable Internet-of-Things systems: a reinforcement learning method. IEEE Trans Ind Inform, 16(9):6103-6113. [29]Diao WP, 2021. Network security situation forecast model based on neural network algorithm development and verification. IEEE 4th Int Conf on Automation, Electronics and Electrical Engineering, p.462-465. [30]Ding HW, Chen LY, Dong L, et al., 2022. Imbalanced data classification: a KNN and generative adversarial networks-based hybrid approach for intrusion detection. Fut Gener Comput Syst, 131:240-254. [31]Elbes M, Alzubi S, Kanan T, et al., 2019. A survey on particle swarm optimization with emphasis on engineering and network applications. Evol Intell, 12(2):113-129. [32]Faker O, Dogdu E, 2019. Intrusion detection using big data and deep learning techniques. Proc ACM Southeast Conf, p.86-93. [33]Garcia AB, Babiceanu RF, Seker R, 2021. Artificial intelligence and machine learning approaches for aviation cybersecurity: an overview. Integrated Communications Navigation and Surveillance Conf, p.1-8. [34]Gharib A, Sharafaldin I, Lashkari AH, et al., 2016. An evaluation framework for intrusion detection dataset. Proc Int Conf on Information Science and Security, p.1-6. [35]Goodfellow IJ, Pouget-Abadie J, Mirza M, et al., 2014. Generative adversarial nets. Proc 27th Int Conf on Neural Information Processing Systems, p.2672-2680. [36]Goodfellow IJ, Bengio Y, Courville A, 2016. Deep Learning. MIT Press, Cambridge, USA. [37]Graves A, Mohamed AR, Hinton G, 2013. Speech recognition with deep recurrent neural networks. Proc IEEE Int Conf on Acoustics, Speech and Signal Processing, p.6645-6649. [38]Gronauer S, Diepold K, 2022. Multi‑agent deep reinforcement learning: a survey. Artif Intell Rev, 55:895-943. [39]Gu YH, Li KY, Guo ZY, et al., 2019. Semi-supervised K-means DDoS detection method using hybrid feature selection algorithm. IEEE Access, 7:64351-64365. [40]Gupta ARB, Agrawal J, 2020. A comprehensive survey on various machine learning methods used for intrusion detection system. IEEE 9th Int Conf on Communication Systems and Network Technologies, p.282-289. [41]Gupta N, Jindal V, Bedi P, 2022. CSE-IDS: using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems. Comput Secur, 112:102499. [42]Hamrioui S, Bokhari S, 2021. A new cybersecurity strategy for IoE by exploiting an optimization approach. 12th Int Conf on Information and Communication Systems, p.23-28. [43]He XM, Wang K, Huang HW, et al., 2020. Green resource allocation based on deep reinforcement learning in content-centric IoT. IEEE Trans Emerg Top Comput, 8(3):781-796. [44]Hessel M, Modayil J, van Hasselt H, et al., 2018. Rainbow: combining improvements in deep reinforcement learning. Proc AAAI Conf on Artificial Intelligence, p.3215-3222. [45]Hindy H, Atkinson R, Tachtatzis C, et al., 2020. Utilising deep learning techniques for effective zero-day attack detection. Electronics, 9(10):1684. [46]Ho S, Al Jufout S, Dajani K, et al., 2021. A novel intrusion detection model for detecting known and innovative cyberattacks using convolutional neural network. IEEE Open J Comput Soc, 2:14-25. [47]Hossain D, Ochiai H, Doudou F, et al., 2020. SSH and FTP brute-force attacks detection in computer networks: LSTM and machine learning approaches. 5th Int Conf on Computer and Communication Systems, p.491-497. [48]Hu BW, Zhou CJ, Tian YC, et al., 2021. Decentralized consensus decision-making for cybersecurity protection in multimicrogrid systems. IEEE Trans Syst Man Cybern Syst, 51(4):2187-2198. [49]Hu CH, Liu GK, Li M, 2021. A network security situation prediction method based on SA-SSA. 14th Int Symp on Computational Intelligence and Design, p.105-110. [50]Hühn J, Hüllermeier E, 2009. FURIA: an algorithm for unordered fuzzy rule induction. Data Min Knowl Discov, 19(3):293-319. [51]Huo D, Li XY, Li LH, et al., 2022. The application of 1D-CNN in microsoft malware detection. 7th Int Conf on Big Data Analytics, p.181-187. [52]Hyder B, Govindarasu M, 2020. Optimization of cybersecurity investment strategies in the smart grid using game-theory. IEEE Power & Energy Society Innovative Smart Grid Technologies Conf, p.1-5. [53]Issa ASA, Albayrak Z, 2021. CLSTMNet: a deep learning model for intrusion detection. 3rd Int Scientific Conf of Engineering Sciences and Advances Technologies, Article 012244. [54]Jain M, Kaur G, 2019. A novel distributed semi-supervised approach for detection of network based attacks. 9th Int Conf on Cloud Computing, Data Science & Engineering, p.120-125. [55]Kan X, Fan YX, Fang ZJ, et al., 2021. A novel IoT network intrusion detection approach based on adaptive particle swarm optimization convolutional neural network. Inform Sci, 568:147-162. [56]Khaw YM, Jahromi AA, Arani MFM, et al., 2021. A deep learning-based cyberattack detection system for transmission protective relays. IEEE Trans Smart Grid, 12(3):2554-2565. [57]Kherlenchimeg Z, Nakaya N, 2018. Network intrusion classifier using autoencoder with recurrent neural network. Proc 4th Int Conf on Electronics and Software Science, p.94-100. [58]Khoa TV, Saputra YM, Hoang DT, et al., 2020. Collaborative learning model for cyberattack detection systems in IoT Industry 4.0. IEEE Wireless Communications and Networking Conf, p.1-6. [59]Kim J, Shin Y, Choi E, 2019. An intrusion detection model based on a convolutional neural network. J Multim Inform Syst, 6(4):165-172. [60]Krizhevsky A, Sutskever I, Hinton GE, 2012. ImageNet classification with deep convolutional neural networks. Proc 25th Int Conf on Neural Information Processing Systems, p.1097-1105. http://doi.org/10.1145/3065386 [61]Kumar N, Zeadally S, Chilamkurti N, et al., 2015. Performance analysis of Bayesian coalition game-based energy-aware virtual machine migration in vehicular mobile cloud. IEEE Netw, 29(2):62-69. [62]Kumar VS, Narasimhan VL, 2021. Using deep learning for assessing cybersecurity economic risks in virtual power plants. 7th Int Conf on Electrical Energy Systems, p.530-537. [63]Kunal, Dua M, 2019. Machine learning approach to IDS: a comprehensive review. 3rd Int Conf on Electronics, Communication and Aerospace Technology, p.117-121. [64]Kunang YN, Nurmaini S, Stiawan D, et al., 2019. Automatic features extraction using autoencoder in intrusion detection system. Proc Int Conf on Electrical Engineering and Computer Science, p.219-224. [65]Ledig C, Theis L, Huszár F, et al., 2017. Photo-realistic single image super-resolution using a generative adversarial network. IEEE Conf on Computer Vision and Pattern Recognition, p.105-114. [66]Li BB, Wu YH, Song JR, et al., 2021. DeepFed: federated deep learning for intrusion detection in industrial cyber-physical systems. IEEE Trans Ind Inform, 17(8):5615-5624. [67]Li DT, Feng HY, Gao YH, 2021. A network security evaluation method based on machine learning algorithm. Electr Des Eng, 29(12):138-142, 147(in Chinese). [68]Li GF, Huang YX, Bie ZH, et al., 2020. Machine-learning-based reliability evaluation framework for power distribution networks. IET Gener Trans Distrib, 14(12):2282-2291. [69]Liu P, Zang WY, 2003. Incentive-based modeling and inference of attacker intent, objectives, and strategies. Proc 10th ACM Conf on Computer and Communications Security, p.179-189. [70]Liu XH, Zhang HW, Dong SQ, et al., 2021. Network defense decision-making based on a stochastic game system and a deep recurrent Q-network. Comput Secur, 111:102480. [71]Liu XX, Zhang JX, Zhu PD, et al., 2021. Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game. Comput Secur, 102:102138. [72]Long J, Shelhamer E, Darrell T, 2015. Fully convolutional networks for semantic segmentation. Proc IEEE Conf on Computer Vision and Pattern Recognition, p.3431-3440. [73]Luan D, Tan XB, 2021. EWM-IFAHP: an improved network security situation assessment model. 2nd Int Conf on Machine Learning and Computer Application, p.1-6. [74]Lye KW, Wing J, 2002. Game Strategies in Cyberspace Security. Technical Report, No. CMU-CS-02-136, School of Computer Science, Carnegie Mellon University, Pittsburgh, USA. [75]Ma PC, Jiang B, Lu ZG, et al., 2021. Cybersecurity named entity recognition using bidirectional long short-term memory with conditional random fields. Tsinghua Sci Technol, 26(3):259-265. [76]Mehta V, Bartzis C, Zhu HF, et al., 2006. Ranking attack graphs. Proc 9th Int Workshop on Recent Advances in Intrusion Detection, p.127-144. [77]Mishra P, Varadharajan V, Tupakula U, et al., 2019. A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun Surv Tut, 21(1):686-728. [78]Mohiuddin MA, Khan SA, Engelbrecht AP, 2016. Fuzzy particle swarm optimization algorithms for the open shortest path first weight setting problem. Appl Intell, 45(3):598-621. [79]Moizuddin MD, Jose MV, 2022. A bio-inspired hybrid deep learning model for network intrusion detection. Knowl-Based Syst, 238:107894. [80]Mushtaq E, Zameer A, Umer M, et al., 2022. A two-stage intrusion detection system with auto-encoder and LSTMs. Appl Soft Comput, 121:108768. [81]Narudin FA, Feizollah A, Anuar NB, et al., 2016. Evaluation of machine learning classifiers for mobile malware detection. Soft Comput, 20(1):343-357. [82]Nguyen HT, Torrano-Gimenez C, Alvarez G, et al., 2011. Application of the generic feature selection measure in detection of web attacks. In: Herrero Á, Corchado E (Eds.), Computational Intelligence in Security for Information Systems. Springer, Berlin, p.25-32. [83]Nguyen TTT, Armitage G, 2008. A survey of techniques for Internet traffic classification using machine learning. IEEE Commun Surv Tut, 10(4):56-76. [84]Nishiyama T, Kumagai A, Kamiya K, et al., 2020. SILU: strategy involving large-scale unlabeled logs for improving malware detector. IEEE Symp on Computers and Communications, p.1-7. [85]Nisioti A, Mylonas A, Yoo PD, et al., 2018. From intrusion detection to attacker attribution: a comprehensive survey of unsupervised methods. IEEE Commun Surv Tut, 20(4):3369-3388. [86]Olowononi FO, Rawat DB, Liu CM, 2021. Resilient machine learning for networked cyber physical systems: a survey for machine learning security to securing machine learning for CPS. IEEE Commun Surv Tut, 23(1):524-552. [87]Park JB, Jeong YW, Shin JR, et al., 2010. Closure to discussion of "An improved particle swarm optimization for nonconvex economic dispatch problems." IEEE Trans Power Syst, 25(4):2010-2011. [88]Pouyanfar S, Sadiq S, Yan YL, et al., 2019. A survey on deep learning: algorithms, techniques, and applications. ACM Comput Surv, 51(5):92. [89]Pu ZY, 2020. Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction. J Supercomput, 76(2):1342-1357. [90]Qazi EUH, Imran M, Haider N, et al., 2022. An intelligent and efficient network intrusion detection system using deep learning. Comput Electr Eng, 99:107764. [91]Roopak M, Tian GY, Chambers J, 2019. Deep learning models for cyber security in IoT networks. IEEE 9th Annual Computing and Communication Workshop and Conf, p.452-457. [92]Sagar BS, Niranjan S, Kashyap N, et al., 2019. Providing cyber security using artificial intelligence—a survey. 3rd Int Conf on Computing Methodologies and Communication, p.717-720. [93]Salih A, Zeebaree ST, Ameen S, et al., 2021. A survey on the role of artificial intelligence, machine learning and deep learning for cybersecurity attack detection. 7th Int Engineering Conf "Research & Innovation amid Global Pandemic", p.61-66. [94]Sapavath NN, Muhati E, Rawat DB, 2021. Prediction and detection of cyberattacks using AI model in virtualized wireless networks. 8th IEEE Int Conf on Cyber Security and Cloud Computing (CSCloud)/7th IEEE Int Conf on Edge Computing and Scalable Cloud, p.97-102. https://doi.org/10.1109/CSCloud-EdgeCom52276.2021.00027 [95]Seth JK, Chandra S, 2018. MIDS: metaheuristic based intrusion detection system for cloud using k-NN and MGWO. 2nd Int Conf on Advances in Computing and Data Sciences, p.411-420. [96]Shafiqur R, Salman K, Luai MA, 2020. The effect of acceleration coefficients in particle swarm optimization algorithm with application to wind farm layout design. FME Trans, 48(4):922-930. [97]Shaikh RA, Shashikala SV, 2019. An autoencoder and LSTM based intrusion detection approach against denial of service attacks. Proc 1st Int Conf on Advances in Information Technology, p.406-410. [98]Shende S, Thorat S, 2020. A review on deep learning method for intrusion detection in network security. 2nd Int Conf on Innovative Mechanisms for Industry Applications, p.173-177. [99]Socher R, Huang EH, Pennington J, et al., 2011a. Dynamic pooling and unfolding recursive autoencoders for paraphrase detection. Proc 24th Int Conf on Neural Information Processing Systems, p.801-809. [100]Socher R, Lin CCY, Ng AY, et al., 2011b. Parsing natural scenes and natural language with recursive neural networks. Proc 28th Int Conf on Machine Learning, p.129-136. [101]Stampa G, Arias M, Sanchez-Charles D, et al., 2017. A deep-reinforcement learning approach for software-defined networking routing optimization. https://arxiv.org/abs/1709.07080 [102]Stevens-Navarro E, Lin YX, Wong VWS, 2008. An MDP-based vertical handoff decision algorithm for heterogeneous wireless networks. IEEE Trans Veh Technol, 57(2):1243-1254. [103]Su JY, 2021. Intelligent network security situation prediction method based on deep reinforcement learning. IEEE Int Conf on Industrial Application of Artificial Intelligence, p.343-348. [104]Sun YY, Liu JJ, Wang JD, et al., 2020. When machine learning meets privacy in 6G: a survey. IEEE Commun Surv Tut, 22(4):2694-2724. [105]Sutskever I, Vinyals O, Le QV, 2014. Sequence to sequence learning with neural networks. Proc 27th Int Conf on Neural Information Processing Systems, p.3104-3112. [106]Tekerek T, 2021. A novel architecture for web-based attack detection using convolutional neural network. Comput Secur, 100:102096. [107]Torres JM, Comesaña CI, García-Nieto PJ, 2019. Review: machine learning techniques applied to cybersecurity. Int J Mach Learn Cybern, 10(10):2823-2836. [108]Touhiduzzaman M, Hahn A, Srivastava AK, 2019. A diversity-based substation cyber defense strategy utilizing coloring games. IEEE Trans Smart Grid, 10(5):5405-5415. [109]Ullah F, Naeem H, Jabbar S, et al., 2019. Cyber security threats detection in Internet of Things using deep learning approach. IEEE Access, 7:124379-124389. [110]Waibel A, Hanazawa T, Hinton G, et al., 1990. Phoneme recognition using time-delay neural networks. In: Waibe A, Lee KF (Eds.), Readings in Speech Recognition. Elsevier, Amsterdam, the Netherlands, p.393-404. [111]Wang JH, Shan ZL, Tan HS, et al., 2021. Network security situation assessment based on genetic optimized PNN neural network. Comput Sci, 48(6):338-342(in Chinese). [112]Wang PY, Govindarasu M, 2020. Multi-agent based attack-resilient system integrity protection for smart grid. IEEE Trans Smart Grid, 11(4):3447-3456. [113]Wei MH, 2021. A new information security evaluation algorithm based on recurrent neural. J Mianyang Teach Coll, 40(2):75-80, 87(in Chinese). [114]Wei YF, Yu FR, Song M, et al., 2019. Joint optimization of caching, computing, and radio resources for fog-enabled IoT using natural actor-critic deep reinforcement learning. IEEE Int Things J, 6(2):2061-2073. [115]Wickramasinghe CS, Marino DL, Amarasinghe K, et al., 2018. Generalization of deep learning for cyber-physical system security: a survey. Proc 44th Annual Conf of the IEEE Industrial Electronics Society, p.745-751. [116]Wu SX, Banzhaf W, 2010. The use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput, 10(1):1-35. [117]Xiao JP, Long C, Zhao J, et al., 2021. Survey of network intrusion detection based on deep learning. Front Data Comput, 3(3):59-74(in Chinese). [118]Xin Y, Kong LS, Liu Z, et al., 2018. Machine learning and deep learning methods for cybersecurity. IEEE Access, 6:35365-35381. [119]Yang HY, Zeng RY, 2021. Method for assessment of network security situation with deep learning. J Xidian Univ, 48(1):183-190(in Chinese). [120]Yang HY, Zeng RY, Xu GQ, et al., 2021. A network security situation assessment method based on adversarial deep learning. Appl Soft Comput, 102:107096. [121]Yang HY, Zhang ZX, Zhang L, 2022a. Network security situation assessment based on deep weighted feature learning. J Cyber Secur, 7(4):32-43(in Chinese). [122]Yang HY, Zhang ZX, Zhang L, 2022b. Network security situation assessments with parallel feature extraction and an improved BiGRU. J Tsinghua Univ (Sci Technol), 62(5):842-848(in Chinese). [123]Yang XJ, Jia YM, 2021. IPSO-LSTM: a new Internet security situation prediction model. 2nd Int Conf on Machine Learning and Computer Application, p.1-5. [124]Ye L, Tan ZJ, 2019. A method of network security situation assessment based on deep learning. Intell Comput Appl, 9(6):73-75, 82(in Chinese). [125]Yeom S, Kim K, 2019. Detail analysis on machine learning based malicious network traffic classification. Proc 8th Int Conf on Smart Media & Applications, p.49-53. [126]Zeadally S, Adi E, Baig Z, et al., 2020. Harnessing artificial intelligence capabilities to improve cybersecurity. IEEE Access, 8:23817-23837. [127]Zhang HY, Lin KY, Chen WW, et al., 2019. Using machine learning techniques to improve intrusion detection accuracy. IEEE 2nd Int Conf on Knowledge Innovation and Invention, p.308-310. [128]Zhang M, Xu BY, Bai S, et al., 2017. A deep learning method to detect web attacks using a specially designed CNN. Proc 24th Int Conf on Neural Information Processing, p.828-836. [129]Zhang R, Wang YB, 2016. Research on machine learning with algorithm and development. J Commun Univ China (Sci Technol), 23(2):10-18, 24(in Chinese). [130]Zhang R, Pan ZH, Yin YF, 2021. Research on assessment algorithm for network security situation based on SSA-BP neural network. 7th Int Symp on System and Software Reliability, p.140-145. [131]Zhang R, Pan ZH, Yin YF, et al., 2022. Network security situation assessment model based on SAA-SSA-BPNN. Comput Eng Appl, 58(11):117-124(in Chinese). [132]Zhang ZQ, 2021. Research on network security situation prediction based on improved and optimized BP neural network. 2nd Int Conf on Electronics, Communications and Information Technology, p.1014-1018. [133]Zhou XY, Belkin M, 2014. Semi-supervised learning. Acad Press Libr Signal Process, 1:1239-1269. [134]Zhou ZH, 2016. Machine Learning. Tsinghua University Press, Beijing, China, p.390-392(in Chinese). Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou
310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE |
Open peer comments: Debate/Discuss/Question/Opinion
<1>