|
[1] O. Yoachimik and J. Pacheco, DDoS threat report for 2023 Q3, Web Page, 2023. [Online]. Available: https://blog.cloudflare.com/ddos-threatreport-2023-q3/. [2] MSRC, Microsoft Response to Distributed Denial of Service (DDoS) Attacks against HTTP/2, Web Page, 2023. [Online]. Available: https://msrc.microsoft. com/blog/2023/10/microsoft-response-to-distributed-denial-ofservice-ddos-attacks-against-http/2/. [3] G. Bourzikas, HTTP/2 Zero-Day vulnerability results in record-breaking DDoS attacks, Web Page, 2023. [Online]. Available: https://blog.cloudflare. com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/. [4] G. Cloud, How it works: The novel HTTP/2 ‘Rapid Reset’DDoS attack, Web Page, 2023. [Online]. Available: https://cloud.google.com/blog/ products/identity-security/how-it-works-the-novel-http2-rapidreset-ddos-attack. [5] CVE, CVE-2023-44487, Web Page, 2023. [Online]. Available: https://www. cve.org/CVERecord?id=CVE-2023-44487. [6] Cloudflare, What is a DDoS attack? Web Page, 2023. [Online]. Available: https: //www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/. [7] Nginx, What Is Load Balancing? Web Page, 2023. [Online]. Available: https: //www.nginx.com/resources/glossary/load-balancing/. [8] Q. Zhou and D. Pezaros, “Evaluation of Machine Learning Classifiers for ZeroDay Intrusion Detection–An Analysis on CIC-AWS-2018 dataset,” arXiv preprint arXiv:1905.03685, 2019. [9] I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating a new intrusion detection dataset and intrusion traffic characterization.,” International Conference on Information Systems Security and Privacy (ICISSp), vol. 1, pp. 108–116, 2018. [10] I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani, “Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy,” in 2019 International Carnahan Conference on Security Technology (ICCST), IEEE, 2019, pp. 1–8. [11] J. Mirkovic and P. Reiher, “A taxonomy of DDoS attack and DDoS defense mechanisms,” ACM SIGCOMM Computer Communication Review, vol. 34, no. 2, pp. 39–53, 2004. [12] A. Asosheh and N. Ramezani, “A comprehensive taxonomy of DDOS attacks and defense mechanism applying in a smart classification,” WSEAS Transactions on Computers, vol. 7, no. 4, pp. 281–290, 2008. [13] A. Bansal and S. Kaur, “Extreme gradient boosting based tuning for classification in intrusion detection systems,” in Advances in Computing and Data Sciences: Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018, Revised Selected Papers, Part I 2, Springer, 2018, pp. 372– 380. [14] T. Chen and C. Guestrin, “Xgboost: A scalable tree boosting system,” in Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining, 2016, pp. 785–794. [15] J. Kim, Y. Shin, E. Choi, et al., “An intrusion detection model based on a convolutional neural network,” Journal of Multimedia Information System, vol. 6, no. 4, pp. 165–172, 2019. [16] J. Kim, J. Kim, H. Kim, M. Shim, and E. Choi, “CNN-based network intrusion detection against denial-of-service attacks,” Electronics, vol. 9, no. 6, p. 916, 2020. [17] J. Hu, C. Liu, and Y. Cui, “An improved CNN approach for network intrusion detection system,” Int. J. Netw. Secur, vol. 23, no. 4, pp. 569–575, 2021. [18] C. Elkan, “Results of the KDD’99 classifier learning,” Acm Sigkdd Explorations Newsletter, vol. 1, no. 2, pp. 63–64, 2000. [19] L. Liu, G. Engelen, T. Lynar, D. Essam, and W. Joosen, “Error prevalence in nids datasets: A case study on cic-ids-2017 and cse-cic-ids-2018,” in 2022 IEEE Conference on Communications and Network Security (CNS), IEEE, 2022, pp. 254–262. [20] L. Dhanabal and S. Shantharajah, “A study on NSL-KDD dataset for intrusion detection system based on classification algorithms,” International journal of advanced research in computer and communication engineering, vol. 4, no. 6, pp. 446–452, 2015. [21] J. Yang, K. Zhou, Y. Li, and Z. Liu, “Generalized out-of-distribution detection: A survey,” arXiv preprint arXiv:2110.11334, 2021. [22] W. J. Scheirer, L. P. Jain, and T. E. Boult, “Probability models for open set recognition,” IEEE transactions on pattern analysis and machine intelligence, vol. 36, no. 11, pp. 2317–2324, 2014. [23] P. Perera and V. M. Patel, “Deep transfer learning for multiple class novelty detection,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2019, pp. 11 544–11 552. [24] Z. Ge, S. Demyanov, Z. Chen, and R. Garnavi, “Generative openmax for multi-class open set classification,” arXiv preprint arXiv:1707.07418, 2017. [25] R. Yoshihashi, W. Shao, R. Kawakami, S. You, M. Iida, and T. Naemura, “Classification-reconstruction learning for open-set recognition,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 4016–4025. [26] A. Cao, Y. Luo, and D. Klabjan, “Open-set recognition with gaussian mixture variational autoencoders,” in Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, 2021, pp. 6877–6884. [27] H. Zhang and V. M. Patel, “Sparse representation-based open set recognition,” IEEE transactions on pattern analysis and machine intelligence, vol. 39, no. 8, pp. 1690–1696, 2016. [28] P. Oza and V. M. Patel, “C2ae: Class conditioned auto-encoder for open-set recognition,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 2307–2316. [29] C.-S. Shieh, W.-W. Lin, T.-T. Nguyen, C.-H. Chen, M.-F. Horng, and D. Miu, “Detection of unknown ddos attacks with deep learning and gaussian mixture model,” Applied Sciences, vol. 11, no. 11, p. 5213, 2021. [30] C.-S. Shieh, T.-T. Nguyen, C.-Y. Chen, and M.-F. Horng, “Detection of Unknown DDoS Attack Using Reconstruct Error and One-Class SVM Featuring Stochastic Gradient Descent,” Mathematics, vol. 11, no. 1, p. 108, 2022. [31] C.-S. Shieh, T.-T. Nguyen, W.-W. Lin, et al., “Detection of adversarial ddos attacks using generative adversarial networks with dual discriminators,” Symmetry, vol. 14, no. 1, p. 66, 2022. [32] C.-S. Shieh, T.-T. Nguyen, W.-W. Lin, W. K. Lai, M.-F. Horng, and D. Miu, “Detection of adversarial ddos attacks using symmetric defense generative adversarial networks,” Electronics, vol. 11, no. 13, p. 1977, 2022. [33] C.-S. Shieh, T.-T. Nguyen, and M.-F. Horng, “Detection of Unknown DDoS Attack Using Convolutional Neural Networks Featuring Geometrical Metric,” Mathematics, vol. 11, no. 9, p. 2145, 2023. [34] E. Mahdavi, A. Fanian, A. Mirzaei, and Z. Taghiyarrenani, “ITL-IDS: Incremental transfer learning for intrusion detection systems,” Knowledge-Based Systems, vol. 253, p. 109 542, 2022. [35] G. Chen, L. Qiao, Y. Shi, et al., “Learning open set network with discriminative reciprocal points,” in Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23–28, 2020, Proceedings, Part III 16, Springer, 2020, pp. 507–522. [36] G. Chen, P. Peng, X. Wang, and Y. Tian, “Adversarial reciprocal points learning for open set recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 44, no. 11, pp. 8065–8081, 2021. [37] 陳羣岳, “使用重構誤差與單類支援向量機之未知分散式阻斷服務攻擊偵測,” Thesis, 2022. [Online]. Available: https://hdl.handle.net/11296/jzrwhr. [38] 高皓, “基於 fuzzy c-means 開集識別技術之未知 ddos 攻擊偵測,” Thesis, 2023. [Online]. Available: https://hdl.handle.net/11296/646sd5. [39] 阮青俊, “植基於深度學習與開集識別技術之未知及對抗式 ddos 攻擊偵測,” Thesis, 2023. [Online]. Available: https://hdl.handle.net/11296/jv38tx
|