参考文献/References:
[1] Zachary G,Schwartz S.Data preprocessing and feature selection for an intrusion detection system dataset[EB/OL].[2019-12-16].https://www.researchgate.net/publication/331730342_Data_preprocessing_and_feature_selection_for_machine_learning_intrusion_detection_systems.
[2] Shekarforoush S,Green R C,Dyer R,et al.Classifying commit messages:a case study in resampling techniques[EB/OL].[2019-12-16].http://ieeexplore.ieee.org/iel7/7958416/7965814/07965999.pdf.
[3] Nitesh V,Kevin W,Lawrence O,et al.SMOTE:synthetic minority over-sampling technique[J].Journal of Artificial Intelligence Research,2012,16:321-357.
[4] Liu Kaijian,Fan Zhen,Liu Meiqin,et al.Hybrid intrusion detection method based on K-means and CNN for smart home[EB/OL].[2019-12-16].https://www.researchgate.net/publication/332378390_Hybrid_Intrusion_Detection_Method_Based_on_K-Means_and_CNN_for_Smart_Home.
[5] Promper C,Engel D,Green R C.Anomaly detection in smart grids with imbalanced data methods[EB/OL].[2019-12-16].http://www.en-trust.at/papers/promper17a.pdf.
[6] Lee J,Park K.GAN-based imbalanced data intrusion detection system[EB/OL].[2019-12-16].https://www.researchgate.net/publication/337169111_GAN-based_imbalanced_data_intrusion_detection_system.
[7] Salem M,Taheri S,Yuan J S,et al.Anomaly generation using generative adversarial networks in host based intrusion detection[EB/OL].[2019-12-16].http://arxiv.org/abs/1812.04697.
[8] Goodfellow I,Pougetabadie J,Mirza M,et al.Generative adversarial nets[EB/OL].[2019-12-16].http://www.iro.umontreal.ca/~lisa/publications2/index.php/publications/show/808.
[9] Radford A,Metz L,Chintala S.Unsupervised representation learning with deep convolutional generative adversarial networks[EB/OL].[2019-12-16].https://arxiv.org/abs/1511.06434v2.
[10] Creech G,Hu Jiankun.A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns[J].IEEE Transactions on Computers,2014,63(4):807-819.
[11] Forrest S,Hofmeyr S,Somayaji A,et al.A sense of self for Unix processes[M].New York:IEEE Symposium on Security and Privacy,1996:120-128.
[12] Subba B,Biswas S,Karmakar S.Host based intrusion detection system using frequency analysis of N-gram term[EB/OL].[2019-12-16].https://www.researchgate.net/publication/322218531_Host_based_intrusion_detection_system_using_frequency_analysis_of_n-gram_terms.
[13] Serpen G,Aghaei E.Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms[J].Intelligent Data Analysis,2018,22(5):1101-1114.
[14] Aghaei E,Serpen G.Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data[R/OL].[2019-12-16].https://arxiv.org/abs/1911.11284.
[15] Warrender C,Forrest S,Pearlmutter B.Detecting intrusions using system calls:alternative data models[EB/OL].[2019-12-16].https://ieeexplore.ieee.org/document/766910.
[16] Gao Debin,Reiter M K,Song D.Behavioral distance measurement using hidden markov models[EB/OL].[2019-12-16].https://www.researchgate.net/publication/221427551_Behavioral_Distance_Measurement_Using_Hidden_Markov_Models.
[17] Liao Yihua,Vemuri V R.Use of K-nearest neighbor classifier for intrusion detection[J].Computers and Security,2002,21(5):439-448.
[18] Zhang Zonghua,Shen Hong.Application of online-training SVMs for real-time intrusion detection with different considerations[J].Computer Communications,2005,28(12):1428-1442.
[19] Vijayanand R,Devaraj D,Kannapiran B,et al.A novel intrusion detection system for wireless mesh network with hybrid feature selection technique based on GA and MI[J].Journal of Intelligent and Fuzzy Systems,2018,34(3):1243-1250.
[20] Bridges R A,Glass-Vanderlan T R,Iannacone M D,et al.A Survey of intrusion detection systems leveraging host data[J].ACM Computeng Surveys,2020,52(6):1-35.
[21] Teng Shaohua,Wu Naiqi,Zhu Haibin,et al.SVM-DT-based adaptive and collaborative intrusion detection[J].IEEE/CAA Journal of Automatica Sinica,2018,5(1):108-118.
[22] Deshpande P,Sharma S C,Peddoju S K,et al.HIDS:a host based intrusion detection system for cloud computing environment[J].International Journal of System Assurance Engineering and Management,2018,9(3):567.
[23] Kashyap A,Kumar G S,Jangir S,et al.IHIDS:introspection-based hybrid intrusion detection system in cloud environment[EB/OL].[2019-12-16].https://ieeexplore.ieee.org/iel7/8119306/8125802/08125921.pdf.
[24] Creech G,Hu Jiankun.A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns[J].IEEE Transactions on Computers,2014,63(4):807-819.
[25] Xie Miao,Hu Jiankun,Slay J,et al.Evaluating host-based anomaly detection systems:application of the one-class SVM algorithm to ADFA-LD[EB/OL].[2019-12-16].https://www.researchgate.net/publication/287318600_Evaluating_host-based_anomaly_detection_systems_Application_of_the_one-class_SVM_algorithm_to_ADFA-LD.
[26] Msika S,Quintero A,Khomh F.SIGMA:strengthening IDS with GAN and Metaheuristics attacks[EB/OL].[2019-12-18].https://arxiv.org/abs/1912.09303.
[27] 滕少华,孔棱睿.基于生成式对抗网络的中文字体风格迁移[J].计算机应用研究,2019,36(10):3164-3167.
[28] 卢逸君.一种主机序列入侵检测方法:中国,2019105964097[P].2019-10-15.