Netinfo Security ›› 2020, Vol. 20 ›› Issue (6): 82-89.doi: 10.3969/j.issn.1671-1122.2020.06.010
Previous Articles Next Articles
Received:
2020-01-15
Online:
2020-06-10
Published:
2020-10-21
Contact:
LUO Zheng
E-mail:roger@cspec.org.cn
CLC Number:
LUO Zheng, ZHANG Xueqian. A Malicious Domain Name Detection Model Based on S-Kohonen Neural Network Optimized by Evolutionary Thinking Algorithm[J]. Netinfo Security, 2020, 20(6): 82-89.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2020.06.010
序号 | 思维进化算法优化 S-Kohonen网络 | 思维进化算法优化BP网络 | 测试集实际 类别 |
---|---|---|---|
1 | 0 | 0 | 0 |
2 | 0 | 0 | 0 |
3 | 0 | 1 | 0 |
4 | 0 | 0 | 0 |
5 | 1 | 1 | 0 |
6 | 0 | 0 | 0 |
7 | 0 | 0 | 0 |
8 | 0 | 0 | 0 |
9 | 0 | 0 | 0 |
10 | 0 | 0 | 0 |
11 | 0 | 0 | 0 |
12 | 0 | 1 | 0 |
13 | 1 | 0 | 0 |
14 | 0 | 0 | 0 |
15 | 0 | 0 | 0 |
16 | 0 | 0 | 0 |
17 | 0 | 0 | 0 |
18 | 0 | 0 | 0 |
19 | 0 | 0 | 0 |
20 | 0 | 0 | 0 |
21 | 1 | 0 | 1 |
22 | 1 | 1 | 1 |
23 | 1 | 1 | 1 |
24 | 0 | 0 | 1 |
25 | 1 | 1 | 1 |
26 | 1 | 1 | 1 |
27 | 1 | 1 | 1 |
28 | 1 | 1 | 1 |
29 | 1 | 1 | 1 |
30 | 1 | 1 | 1 |
31 | 1 | 1 | 1 |
32 | 1 | 1 | 1 |
33 | 1 | 1 | 1 |
34 | 1 | 1 | 1 |
35 | 1 | 1 | 1 |
36 | 1 | 1 | 1 |
37 | 1 | 0 | 1 |
38 | 1 | 1 | 1 |
39 | 1 | 1 | 1 |
40 | 1 | 1 | 1 |
[1] | YIN Congxian. Research And Implementation Of Malicious Domain Name Detection Technology Based On Big Data Analysis[D]. Beijing:Beijing University of Posts and Telecommunications, 2018. |
殷聪贤. 基于大数据分析的恶意域名检测技术研究与实现[D]. 北京:北京邮电大学, 2018. | |
[2] | HONG Bo, GENG Guanggang, WANG Liming, et al. System to discover phishing attacks actively based on DNS[J]. Application Research of Computers, 2013,30(12):3771-3774. |
洪博, 耿光刚, 王利明, 等. 一种基于DNS主动检测钓鱼攻击的系统[J]. 计算机应用研究, 2013,30(12):3771-3774. | |
[3] | ZHANG Y, HONG J I, CRANOR L F. Cantina: A Content-Based Approach to Detecting Phishing Web Sites[EB/OL]. http://www.researchgate.net/publication/221023659_CANTINA_A_content-based_approach_to_detecting_phishing_web_sites?_sg=w9ZhIXNv5TCQn_H9GIVF76s09HqBjnKpCuWsAoZDeGp7x_zIPjkrGs6f9KxeYK4Rt5dMk2vgdD6c0_2QuhHwwg, 2019-10-15. |
[4] | CANALI D, COVA M, VIGNA G, et al. Prophiler: A Fast Filter for the Large-Scale Detection of Malicious Web Pages[EB/OL]. http://www.researchgate.net/publication/221023059_Prophiler_A_fast_filter_for_the_large-scale_detection_of_malicious_web_pages?ev=auth_pub, 2019-10-15. |
[5] | CHOI H, ZHU B B, LEE H. Detecting Malicious Web Links and Identifying Their Attack Types[EB/OL]. Detecting Malicious Web Links and Identifying Their Attack Types, 2019 -10-15. |
[6] | ZHANG Siyu. Malware Domain Name Mining Based on DNS Traffic[D]. Shanghai: Shanghai Jiao Tong University, 2014. |
章思宇. 基于DNS流量的恶意软件域名挖掘[D]. 上海:上海交通大学, 2014. | |
[7] | LI Kunlun, DONG Ning, GUAN Liwei, et al. DoS Attack Detection Algorithm of the Improved Kohonen Network[J]. Journal of Chinese Computer Systems, 2017,38(3):450-454. |
李昆仑, 董宁, 关立伟, 等. 一种改进Kohonen网络的DoS攻击检测算法[J]. 小型微型计算机系统, 2017,38(3):450-454. | |
[8] | DONG Ning. Research on Denial of Service Attack Detection Algorithm Based on S-Kohonen Neural Network[D]. Baoding: Hebei University, 2017. |
董宁. 基于S-Kohonen神经网络的拒绝服务攻击检测算法的研究[D]. 保定:河北大学, 2017. | |
[9] | LU Peng, TANG Chao. Research on DoS Attack Detection Algorithm Based on S-Kohonen[J]. Computer Measurement & Control, 2018,26(10):165-169. |
卢鹏, 唐超. 基于S-Kohonen的DoS攻击检测算法研究[J]. 计算机测量与控制, 2018,26(10):165-169. | |
[10] | MA Wei, MA Quanfu. Application of Supervised Kohonen Neural Network in Cancer Diagnosis[J]. Microelectronics & Computer, 2014,31(12):108-110, 113. |
马卫, 马全富. 有监督的Kohonen神经网络聚类算法在癌症诊断中的应用[J]. 微电子学与计算机, 2014,31(12):108-110,113. | |
[11] | GUO Xin, WANG Lei, XUAN Bokai, et al. Gait Recognition Based on Supervised Kohonen Neural Network[J]. Acta Automatica Sinica, 2017,43(3):430-438. |
郭欣, 王蕾, 宣伯凯, 等. 基于有监督Kohonen神经网络的步态识别[J]. 自动化学报, 2017,43(3):430-438. | |
[12] | LIU Wei. Research on the Utility of Grey Neural Network Model Based on Thought Evolution Algorithm in GDP Prediction[D]. Qinhuangdao: Yanshan University, 2018. |
刘伟. 基于思维进化算法的灰色神经网络模型预测GDP的效用研究[D]. 秦皇岛:燕山大学, 2018. | |
[13] | HUANG Wei, CHANG Jun, SUN Zhibin. Characteristic Curve Prediction of Compressor Based on MEA-BP Neural Network[J]. Journal of Chongqing Institute of Technology, 2019,33(2):67-74. |
黄伟, 常俊, 孙智滨. 基于MEA-BP神经网络的压气机特性曲线预测[J]. 重庆理工大学学报, 2019,33(2):67-74. | |
[14] | LIN Qilin, BAO Guangqing. Daily Power Load Forecasting Based on MEA-Elman Neural Network Model[J]. Industrial Instrumentation & Automation, 2017,17(3):7-10. |
林麒麟, 包广清. 基于MEA-Elman神经网络的电力日负荷预测[J]. 工业仪表与自动化装置, 2017,17(3):7-10. | |
[15] | SONG Hongda, DONG Xin. Research and Implementation of Malicious Domain Name Detection Technology Based on Big Data Analysis[J]. Journal of Educational Institute of Jilin Province, 2014,30(12):142-144. |
宋泓达, 董鑫. 基于改进思维进化算法的神经网络负荷预测[J]. 吉林省教育学院学报, 2014,30(12):142-144. | |
[16] | GAO Shuai, HU Hongping, LI YangAQI, et al. Prediction Based on Improved Mind Evolutionary Algorithm and BP Neural Network[J]. Mathematics in Practice and Theory, 2018,48(19):151-157. |
高帅, 胡红萍, 李洋, 等. 基于改进的思维进化算法与BP神经网络的AQI预测[J]. 数学的实践与认识, 2018,48(19):151-157. | |
[17] | YU Jun, WANG Zhao, JI Tianming, et al. Wind Power Prediction Research Based on Mind Evolutionary Algorithm[J]. Computing Technology and Automation, 2017,36(2):95-99. |
俞俊, 王召, 籍天明, 等. 基于思维进化算法的风电功率预测研究[J]. 计算技术与自动化, 2017,36(2):95-99. | |
[18] | WEN Yongjun, KONG Fanzhi, LI Xiaobo. Design of the Visit Statistic System for Web Site Based on the Alexa[J]. Journal Of Hunan City University(Natural Science), 2010,19(4):67-69. |
文勇军, 孔凡志, 李小波. 基于Alexa的网站访问统计系统的设计[J]. 湖南城市学院学报(自然科学版), 2010,19(4):67-69. | |
[19] | LI Xiaobin. Research on Detection and Protection of Malicious Domain Name Based on SDN and Machine Learning[D]. Chongqing: Chongqing University, 2017. |
李小兵. 基于SDN和机器学习的恶意域名检测与防护的研究[D]. 重庆:重庆大学, 2017. | |
[20] | ZOU Hongxia, QIN Feng, CHENG Zekai. Algorithm for Generating ROC Curve of Two-Classifier[J]. Computer Technology And Development, 2009,19(6):109-112. |
邹洪侠, 秦锋, 程泽凯, 等. 二类分类器的ROC曲线生成算法[J]. 计算机技术与发展, 2009,19(6):109-112. |
[1] | LU Jiali. Log Anomaly Detection Method Based on Improved Time Series Model [J]. Netinfo Security, 2020, 20(9): 1-5. |
[2] | SHEN Jinwei, ZHAO Yi, LIANG Chunlin, ZHANG Ping. RFID Group Tag Ownership Transfer Protocol Based on Cyclic Grouping Function [J]. Netinfo Security, 2020, 20(9): 102-106. |
[3] | ZHOU Zhining, WANG Binjun, ZHAI Yiming, TONG Xin. Spam Filtering Model Based on ALBERT Dynamic Word Vector [J]. Netinfo Security, 2020, 20(9): 107-111. |
[4] | HAN Lei, CHEN Wuping, ZENG Zhiqiang, ZENG Yingming. Research on Hierarchical Network Structure and Application of Blockchain [J]. Netinfo Security, 2020, 20(9): 112-116. |
[5] | LI Qiao, LONG Chun, WEI Jinxia, ZHAO Jing. A Hybrid Model of Intrusion Detection Based on LMDR and CNN [J]. Netinfo Security, 2020, 20(9): 117-121. |
[6] | TONG Xin, WANG Luona, WANG Runzheng, WANG Jingya. A Generation Method of Word-level Adversarial Samples for Chinese Text Classification [J]. Netinfo Security, 2020, 20(9): 12-16. |
[7] | HUANG Na, HE Jingsha, WU Yabiao, LI Jianguo. Method of Insider Threat Detection Based on LSTM Regression Model [J]. Netinfo Security, 2020, 20(9): 17-21. |
[8] | ZHANG Runzi, LIU Wenmao, YOU Yang, XIE Feng. Research on AISecOps Automation Levels and Technology Trends [J]. Netinfo Security, 2020, 20(9): 22-26. |
[9] | WU Zenan, TIAN Liqin, CHEN Nan. Research on Quantitative Analysis of System Security Based on Stochastic Petri Net [J]. Netinfo Security, 2020, 20(9): 27-31. |
[10] | XU Yu, ZHOU You, LIN Lu, ZHANG Cong. Applied Research of Unsupervised Machine Learning in Game Anti-fraud [J]. Netinfo Security, 2020, 20(9): 32-36. |
[11] | XU Huikai, LIU Yue, MA Zhenbang, DUAN Haixin. A Large-scale Measurement Study of MQTT Security [J]. Netinfo Security, 2020, 20(9): 37-41. |
[12] | LIU Daheng, LI Hongling. Research on QR Code Phishing Detection [J]. Netinfo Security, 2020, 20(9): 42-46. |
[13] | WANG Jinmiao, XIE Yongheng, WANG Guowei, LI Yiting. A Method of Privacy Preserving and Access Control in Blockchain Based on Attribute-based Encryption [J]. Netinfo Security, 2020, 20(9): 47-51. |
[14] | ZENG Yingming, WANG Bin, GUO Min. Research on Collaborative Defense Technology of Network Security Based on Swarm Intelligence [J]. Netinfo Security, 2020, 20(9): 52-56. |
[15] | LI Shibin, LI Jing, TANG Gang, LI Yi. Method of Network Security States Prediction and Risk Assessment for Industrial Control System Based on HMM [J]. Netinfo Security, 2020, 20(9): 57-61. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||