LI Daoquan, LU Xiaofu, YANG Qianqian. Malicious Traffic Detection Method Based on Siamese Neural Network[J]. Computer Engineering and Applications, 2022, 58(14): 89-95.
[1] BIERSACK E,CALLEGARI C,MATIJASEVIC M.Data traffic monitoring and analysis[J].Lecture Notes in Computer Science,2013,5(23):12561-12570.
[2] YOON S H,PARK J W,PARK J S,et al.Internet application traffic classification using fixed IP-port[C]//Asia-Pacific Network Operations and Management Symposium.Berlin,Heidelberg:Springer,2009:21-30.
[3] CASCARANO N,CIMINIERA L,RISSO F.Improving cost and accuracy of DPI traffic classifiers[C]//Proceedings of the 2010 ACM Symposium on Applied Computing,2010:641-646.
[4] 郭宝华.基于SDN和机器学习的QoS保障技术研究[D].西安:西安电子科技大学,2019.
GUO B H.Research on QoS guaranteed technology based on SDN and machine learning[D].Xi’an:Xidian University,2019.
[5] 刘纪伟,赵杨,李绍晖.一种基于改进K-means算法的网络流量分类方法[J].电子技术应用,2017,43(11):86-89.
LIU J W,ZHAO Y,LI S H.One method of network traffic classification based on improved K-means algorithm[J].Application of Electronic Technique,2017,43(11):86-89.
[6] LECUN Y,BENGIO Y,HINTON G.Deep learning[J].Nature,2015,521(7553):436-444.
[7] WANG W,ZHU M,ZENG X,et al.Malware traffic classification using convolutional neural network for representation learning[C]//2017 International Conference on Information Networking(ICOIN),2017:712-717.
[8] 李道全,王雪,于波,等.基于一维卷积神经网络的网络流量分类方法[J].计算机工程与应用,2020,56(3):94-99.
LI D Q,WANG X,YU B,et al.Network traffic classification method based on one-dimensional convolution neural network[J].Computer Engineering and Applications,2020,56(3):94-99.
[9] ZOU Z,GE J,ZHENG H,et al.Encrypted traffic classification with a convolutional long short-term memory neural network[C]//2018 IEEE 20th International Conference on High Performance Computing and Communications;IEEE 16th International Conference on Smart City;IEEE 4th International Conference on Data Science and Systems(HPCC/SmartCity/DSS),2018:329-334.
[10] HE Y,LI W.Image-based encrypted traffic classification with convolution neural networks[C]//2020 IEEE Fifth International Conference on Data Science in Cyberspace(DSC),2020:271-278.
[11] Ixia Corporation.Ixia breakpoint overview and specifications[EB/OL].[2021-01-10].https://www.ixiacom.com/products/breakingpoint.
[12] CTU University.The stratosphere IPS project dataset[EB/OL].[2021-01-10].https://stratosphereips.org/category/dataset.html.
[13] CUI Z,XUE F,CAI X,et al.Detection of malicious code variants based on deep learning[J].IEEE Transactions on Industrial Informatics,2018,14(7):3187-3196.
[14] LI J,LU B L.An adaptive image Euclidean distance[J].Pattern Recognition,2009,42(3):349-357.
[15] BUJA A,STUETZLE W,SHEN Y.Loss functions for binary class probability estimation and classification:structure and applications[Z].Working Draft,2005.
[16] HINDY H,TACHTATZIS C,ATKINSON R,et al.Leveraging siamese networks for one-shot intrusion detection model[J].arXiv:2006.15343,2020.
[17] LI Q,WANG X.Image classification based on SIFT and SVM[C]//2018 IEEE/ACIS 17th International Conference on Computer and Information Science(ICIS),2018:762-765.