- [1] Husák, M.; Komárková, J.; Bou-Harb E.; Čeleda, P. “Survey of Attack Projection, Prediction, and Forecasting in Cyber Security”; IEEE Commun. Surv. Tutorials., 2018, 21, 1, 640–660. http://doi.org/10.1109/COMST.2018.2871866.
- [2] Yu, H. Lee, M.-S. Kim, and D. Park, “Traffic Flooding Attack Detection with SNMP MIB using SVM”; Comput. Commun., 2008, 31, 17, 4212–4219. http://doi.org/10.1016/ j.comcom.2008.09.018.
- [3] Asadi, M.; Parsa, S.; Jabreil Jamali, M. A.; Majidnezhad, V. “P2P Botnet Detection Using Deep Learning Method”; Electronic and Cyber Defense 2020, 8, 1–14. (In Persian)
- [4] Alipour, M. M.; Shokrollahi, S. “The Presentation of a New Defense Framework Against the Distributed Denial of Service Attacks Using the Software Defined Network”; Adv. Defence Sci. & Technol. 2021, 12, 273–284. (In Persian)
- [5] Alkasassbeh, ; Al-Naymat, G.; Hassanat, A.; Almseidin, M. “Detecting Distributed Denial of Service Attacks using Data Mining Techniques”; Int. J. Adv. Comput. Sci. Appl. 2016, 7, 436–445. http://doi.org/10.14569/IJACSA.2016. 070159.
- [6] Thakkar, A.; Lohiya, R. “A Survey on Intrusion Detection System: Feature Selection, Model, Performance Measures, Application Perspective, Challenges, and Future Research Directions”; Artif. Intell. Rev. 2022, 55, 453–563. http:// doi.org/10.1007/s10462-021-10037-9.
- [7] Asadi, M. “Detecting IoT Botnets Based on the Combination of Cooperative Game Theory with Deep and Machine Learning Approaches”; J. Ambient Intell. Hum. Comput. 2021, 13, 5547-5561. http://doi.org/10.1007/ s12652-021-03185-x.
- [8] Asadi, M.; Parsa, S.; Jabreil Jamali, M. A.; Majidnezhad, V. “Detecting Botnet by using Particle Swarm Optimization Algorithm Based on Voting System”; Future Gener. Comput. Syst. 2020, 107, 95–111. http://doi.org/10.1016/ j.future.2020.01. 055.
- [9] Al-Naymat, G.; Al-Kasassbeh, M.; Al-Hawari, E. “Exploiting SNMP-MIB Data to Detect Network Anomalies using Machine Learning Techniques”; SAI Intelligent Systems Conference, 2018, 991–1004.
- Pathan, A.-S. K. “The State of the Art in Intrusion Prevention and Detection”; Auerbach Publications, 2014. http://doi.org/10.1201/ b16390.
- Alhaidari, S.; Alharbi, A.; Alshaikhsaleh, M.; Zohdy, M.; Debnath, D. “Network Traffic Anomaly Detection Based on Viterbi Algorithm using SNMP-MIB Data”; Third Int. Conf. Information System and Data Mining, 2019, 92–97. http://doi.org/10.1145/3325917.3325928.
- Al-Kasassbeh, M.; Al-Naymat, G.; Al-Hawari, E. “Towards Generating Realistic SNMP-MIB Dataset for Network Anomaly Detection”; Int. J. Comput. Sci. Inform. Secur. 2016, 14, 1162-1185.
- Abushwereb, M.; Mustafa, M.; Al-Kasassbeh, M.; Qasaimeh, M. “Attack Based DoS Attack Detection using Multiple Classifier” arXiv Prepr. arXiv2001.05707, 2020.
- Cabrera, J. B. D.; Lewis, L.; Qin, X.; Lee, W.; Mehra, R. K. “Proactive Intrusion Detection and Distributed Denial of Service Attacks: A Case Study in Security Management”; J. Network Syst. Manage. 2002, 10, 225–254. http://doi.org/ 10.1023/ A:1015910917349.
- Rahmani, C.; Sharifi, M.; Tafazzoli, T. “An Exprimental Analysis of Proactive Detection of Distributed Denial of Service Attacks”; IIT Kanpur Hackers Workshop (IITKHACK04) 2004, 37–44.
- Hsiao, H.-W.; Lin, C. S.; Chang, S.-Y. “Constructing an ARP Attack Detection System with SNMP Traffic Data Mining”; 11th Int. Conf. Electronic Commerce 2009, 341–345. http://doi.org/10.1145/1593254.1593309.
- Yu, J.; Kang, H.; Park, D.; Bang, H.-C.; Kang, D. W. “An In-Depth Analysis on Traffic Flooding Attacks Detection and System using Data Mining Techniques”; Journal of Systems Architecture, 2013, 59, 1005–1012. http://doi.org/ 10.1016/ j.sysarc.2013.08.008.
- Cerroni, W.; Moro, G.; Pirini, T.; Ramilli, M. “Peer-to-Peer Data Mining Classifiers for Decentralized Detection of Network Attacks”; Twenty-Fourth Australasian Database Conference, 2013, 101–107.
- Namvarasl S.; Ahmadzadeh, M. “A Dynamic Flooding Attack Detection System Based on Different Classification Techniques and using SNMP-MIB Data”; Int. J. Comput. Netw. Commun. Secur. 2014, 2, 9, 279–284.
- Cerroni, W.; Moro, G.; Pasolini, R.; Ramilli, M. “Decentralized Detection of Network Attacks Through P2P Data Clustering of SNMP Data”; Comput. Secur. 2015, 52, 1–16. http://doi.org/10.1016/ j.cose.2015.03.006.
- Al-Naymat, G.; Hambouz, A.; Alkasassbeh, M. “Evaluating the Impact of Feature Selection Methods on SNMP-MIB Interface Parameters to Accurately Detect Network Anomalies”; IEEE International Symposium on Signal Processing and Information Technology, 2019, 1–6. http://doi.org/10.1109/ ISSPIT47144. 2019.9001882.
- Manna A.; Alkasassbeh, M. “Detecting Network Anomalies using Machine Learning and SNMP-MIB Dataset with IP Group”; 2nd International Conference on New Trends in Computing Sciences (ICTCS), 2019, 1–5. http://doi.org/ 10.1109/ ICTCS. 2019.8923043.
- Rajasekar P.; Magudeeswaran, V. “GRU-BWFA Classifier for Detecting DDoS Attack within SNMP-MIB Dataset”; Wireless Pers. Commun., 2021. http://doi.org/10.21203/ rs.3.rs-848205/v1.
- Shiravi, A.; Shiravi, H.; Tavallaee, M.; Ghorbani, A. A. “Toward Developing a Systematic Approach to Generate Benchmark Datasets for Intrusion Detection”; Comput. Secur., 2012, 31, 357–374. http://doi.org/10.1016/ J.COSE.2011.12.012.
- Alpaydin E. “Machine Learning: The New AI"; MIT press, 2016. http://doi.org/10.7551/mitpress/13811.001.0001.
- Ding, S.; Hu, S.; Pan, J.; Li, X.; Li, G.; Liu, X. “A Homogeneous Ensemble Method for Predicting Gastric Cancer Based on Gastroscopy Reports”; Expert Syst. 2020, 37, 3, e12499. http://doi.org/10.1111/exsy.12499.
- Petrakova, A.; Affenzeller, M.; Merkurjeva, G. “Heterogeneous versus Homogeneous Machine Learning Ensembles”; Inf. Technol. Manage. Sci. 2015, 18, 135–140. http://doi.org/10.1515/itms-2015-0021.
- Asuero, A. G.; Sayago, A.; González, A. G. “The Correlation Coefficient: An Overview”; Crit. Rev. Anal. Chem. 2006, 36, 41-59. http://doi.org/10.1080/10408340500526766.
|