|
[1] Gartner.com, Analysts to Explore How IoT Will Accelerate Digital Transformation Initiatives, in Gartner IT Symposium/Xpo Barcelona, Spain, November 2019, [Online]. Available: https://www.gartner.com/en/newsroom/press-releases/2019-08-29-gartner-says-5-8-billion-enterprise-and-automotive-io. [2] J.Z. You, Y.Y. Zhang, S.C. Lv, X. Chen, L.B. Yin and L.M. Sun, "Method of ICS Honeypot Identification Based on Packet-Sharding," Journal of Cyber Security, vol. 4, no. 3, pp. 83-92, 2019 [3] F. Cohen, "The deception toolkit," 1998, [Online]. Available: http://-all.net/journal/deception/deception.html. [4] L. Spitzner, "To build a honeypot," Cryptogram Newsletter, pp.1-2, June 2001. [5] Google.com, How search organizes information [Online]. Available: https://www.google.com/intl/en_us/search/howsearchworks/crawling-indexing/. [6] Phantomjs.org, A headless web browser scriptable with JavaScript, [Online]. Available: https://phantomjs.org/. [7] Selenium.dev, The story starts in 2004, [Online]. Available: https://www.-selenium.dev/history/. [8] Pptr.dev, programmatically controlling Chrome from Node.js, [Online]. Available: https://pptr.dev/. [9] Researcher.waston.ibm.com, Virtual Machine Monitors: The Original Execution Environment, [Online]. Available: https://researcher.watson.ibm.com/researcher-/files/us-hindm/Rosenblum.pdf. [10] Docker.com, A tool designed to make it easier to create, deploy, and run applications by using containers, [Online]. Available: https://www.docker.com/. [11] J.P. Anderson, "Computer Security Threat Monitoring and Surveillance," Technical Report, James P. Anderson Company, 1980. [12] D.E. Denning, "An intrusion-detection model," IEEE Transactions on Software Engineering, vol. 13, no. 2, pp. 222-232, 1987. [13] J.A. Anderson, "An introduction to neural networks," MIT press, 1995. [14] O. Depren, M. Topallar, E. Anarim, and M.K. Ciliz, "An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks," Expert systems with Applications, vol. 29, no. 4, pp. 713-722, 2005. [15] Trendmicro.com, First malware-driven power outage reported in Ukraine, [Online]. Available: https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/first-malware-driven-power-outage-reported-in-ukraine. [16] Oath.com, Yahoo provides notice to additional users affected by previously disclosed 2013 data theft, [Online]. Available: https://www.oath.com/press-/yahooprovides-notice-to-additional-users-affected-by-previously/. [17] D. Khosrowshahi, 2016 Data Security Incident, [Online]. Available: https://www. uber.com/newsroom /2016-data-incident/. [18] Symantec.com, ISTR: Internet Security Threat Report, [Online]. Available: https:// www.symantec.com/content/dam/symantec/docs/reports/istr-23-2018-en.pdf. [19] A.L. Samuel, "Some Studies in Machine Learning Using the Game of Checkers," 82 IBM Journal of Research and Development, vol. 3, no. 3, pp. 210-229, 1959. [20] T.M. Cover, and P.E. Hart, "Nearest neighbor pattern classification," in IEEE Transactions on Information Theory, vol. 13, no. 1, pp. 21-27, 1967. [21] P.J. Werbos, "Application of Advances in Nonlinear Sensitivity Analysis," in Proceedings of the 10th IFIP Conference, pp. 762-770, 1981. [22] J. R. Quinlan, "Induction of Decision Trees," in Machine Learning 1 Reprinted in Shavlik, vol. 1, no. 1, pp 81–106, 1986. [23] T.K. Ho, "Random decision forests," in Proceedings of 3rd International Conference on Document Analysis and Recognition, vol. 1, pp. 278-282, 1995. [24] C.Cortes, and V. Vapnik, "Support-vector networks," Machine learning, vol. 20, no. 3, pp. 273-297, 1995. [25] W. S. McCulloch, W. Pitts, “A logical calculus of the ideas immanent in nervous activity,” in The bulletin of mathematical biophysics, vol. 5, pp. 115–133, 1943. [26] D. E. Rumelhart, G. E. Hinton and R. J. Williams, "Learning representations by back-propagating errors," Nature, vol. 323, pp. 533-536, 1986. [27] R. Bellman, "Dynamic programming," Princeton University Press, Princeton, 1957. [28] G. Hughes, "On the mean accuracy of statistical pattern recognizers," in IEEE Transactions on Information Theory, vol. 14, no. 1, pp. 55-63, 1968. [29] Cs.waikato.ac.nz, Weka 3: Machine Learning Software in Java, [Online]. Available: https://www.cs.waikato.ac.nz/ml/weka/index.html. [30] D. E. Rumelhart, G. E. Hinton and R. J. Williams, "Learning internal representations by error propagation," Parallel Distributed Processing: Explorations in the Microstructure of Cognition, vol. 1, pp. 318-362, 1986. [31] S. Hochreiter and J. Schmidhuber, "Long short-term memory," Neural Computation, vol. 9, no. 8, pp. 1735-1780, 1997. [32] K. Fukishima, "Neocognitron: A self-organizing neural network model for a mechanism of pattern recognition unaffected by shift in position," Biological Cybernetics, vol. 36, no. 4, pp. 193-202, 1980. [33] Y. LeCun, B. Boser, J. S. Denker, D. Henderson, R. E. Howard, W. Hubbard and L. D. Jackel, "Backpropagation Applied to Handwritten Zip Code Recognition," Neural Computation, vol. 1, no. 4, pp. 541-551, 1989. [34] Y. Lecun, L. Bottou, Y. Bengio and P. Haffner, "Gradient-Based Learning Applied to Document Recognition," Proceedings of the IEEE, vol. 86, no. 11, pp. 2278- 2324, 1998. [35] A. Krizhevsky, I. Sutskever and G. E. Hinton, "ImageNet Classification with Deep Convolutional Neural Networks," in Proceedings of the 25th International Conference on Neural Information Processing Systems, Lake Tahoe, Nevada, pp. 1097-1105, 2012. [36] T. Kaur, V. Malhotra and D. Singh, "Comparison of network security tools- Firewall, Intrusion Detection System and Honeypot," in International Journal of Enhanced Research in Science Technology & Engineering, vol. 3, no. 2, pp. 200-204, 2014. [37] A. Pawar, K. Siddhabbati, S. Bhise and S. Tamhane, "Web Application Honeypot," in International Journal of Advance Research in Computer Science and Management Studies, vol. 2, no. 3, pp. 410-416, 2014. [38] Owasp.org, The Open Web Application Security Project, [Online]. Available: https://owasp.org/. [39] I. Lee, S. Jeong, S. Yeo and J. Moon, "A novel method for SQL injection attack detection based on removing SQL query attribute values," in Mathematical and Computer Modelling, vol. 55, no. 1-2, pp. 58-68, 2011. [40] Owasp.org, OWASP Top 10 Web Application Security Risks, [Online]. Available: https://owasp.org/www-project-top-ten/. [41] Parosproxy.org, An automatic tool for scanning web program vulnerabilities, [Online]. Available: http://www.parosproxy.org/. [42] C.L. Yin, Y.F. Zhu, J.L. Fei and X.H. He, "A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks," IEEE Access, vol. 5, pp. 21954-21961, 2017. [43] N.Koroniotis, N.Moustafa, E.Sitnikova and B.Turnbull, "Towards the develop-ment of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset," Future Generation Computer Systems, vol. 100, pp. 779-796, 2019. [44] Ostinato.org, A packet generator and network traffic generator, [Online]. Available: https://ostinato.org/. [45] wireshark.org, Tshark network analysis tool, [Online]. Available: https://www.-wireshark.org/ [46] Openargus.org, A network flow system, [Online]. Available: https://openargus.-org/. [47] R.W. Emerson, "Causation and Pearson's Correlation Coefficient," in Journal of Visual Impairment & Blindness, vol. 109, no. 3, pp. 242, 2015. [48] Checklyhq.com, Recording browser interaction and generating Puppeteer scripts, [Online]. Available: https://www.checklyhq.com/. [49] D.P. Kingma and J.L. Ba, "ADAM: A Method for stochastic optimization,"at 3rd International Conference for Learning Representations(ICLR), 2015. [50] N. Moustafa, and J. Slay, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in Proceedings of Military Communications and Information Systems Conference(MilCIS), 2015. [51] M.A. Ferrag, L. Maglaras and S. Member, "DeepCoin: A Novel Deep learning and Blockchain-based Energy Exchange Framework for Smart Grids," in IEEE Transactions on Engineering Management, pp. 1-13, 2019. [52] M.A. Ferrag, L. Maglaras, S. Moschoyiannis and H. Janicke, "Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study," Journal of Information Security and Applications, vol. 50, 2020.
|