[1] |
国家互联网应急中心.2019年上半年我国互联网网络安全态势[EB/OL].[ 2020- 07- 16]. http://www.cac.gov.cn/2019-08/13/c_1124871484.htm.
|
[2] |
YAO J Y, FAN X N, CAO N. Survey of Network Security Situational Awareness [C]//Lecture Notes in Computer Science:11982.Heidelberg:Springer, 2019: 34-44.
|
[3] |
ZHAO X L, XU H, WANG T, et al. Research on Multidimensional System Security Assessment Based on AHP and Gray Correlation [C]// Communications in Computer and Information Science:1149.Heidelberg:Springer Verlag, 2019: 177-192.
|
[4] |
ALALI M, ALMOGREN A, HASSAN M M, et al. Improving Risk Assessment Model of Cyber Security Using Fuzzy Logic Inference System[J]. Computers and Security, 2018,74:323-339.
|
[5] |
DONG G S, LI W C, WANG S W, et al. The Assessment Method of Network Security Situation Based on Improved BP Neural Network [C]//Advances in Intelligent Systems and Computing:905.Heidelberg:Springer Verlag, 2020: 67-76.
|
[6] |
文志诚, 曹春丽, 周浩. 基于朴素贝叶斯分类器的网络安全态势评估方法[J]. 计算机应用, 2015,35(8):2164-2168.
|
|
WEN Zhicheng, CAO Chunli, ZHOU Hao. Network Security Situation Assessment Method Based on Naive Bayes Classifier[J]. Journal of Computer Applications, 2015,35(8):2164-2168.
|
[7] |
HU J J, MA D Y, LIU C, et al. Network Security Situation Prediction Based on MR-SVM[J]. IEEE Access, 2019,7:130937-130945.
|
[8] |
HODO E, BELLEKENS X, HAMILTON A, et al. Shallow and Deep Networks Intrusion Detection System:a Taxonomy and Survey[J/OL].[2020-11-01].https://arxiv.org/pdf/1701.02145.pdf.
|
[9] |
ALTHUBITI S A, JONES E M, ROY K. LSTM for Anomaly-based Network Intrusion Detection [C]//Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference.Piscataway:IEEE, 2018: 8615300.
|
[10] |
NIYAZ Q, SUN W Q, JAVAID A Y, et al. A Deep Learning Approach for Network Intrusion Detection System [C]//Proceedings of the 2015 EAI International Conference on Bio-inspired Information and Communications Technologies.Heidelberg:Springer, 2015: 21-26.
|
[11] |
HINTON G E, SALAKHUTDINOV R R. Reducing the dimensionality of data with neural networks[J]. Science, 2006,313(5786):504-507.
doi: 10.1126/science.1127647
pmid: 16873662
|
[12] |
BALA R, NAGPAL R. A Review on KDD Cup99 and NSL-KDD Dataset[J]. International Journal of Advanced Research in Computer Science. 2019,10(2):64-67.
|
[13] |
CHAWLA N V, BOWYER K W, HALL L O, et al. SMOTE:Synthetic Minority Over-sampling Technique[J]. Journal of Artificial Intelligence Research, 2002,16(1):321-357.
|
[14] |
CVSS.Common Vulnerability Scoring System version 3.1:Specification Document CVSS Version 3.1 Release[S/OL].[2020-07-20].https://www.first.org/cvss/specification-document.
|
[15] |
国务院. 国家突发公共事件总体应急预案[M]. 北京: 中国法制出版社, 2006.
|