Netinfo Security ›› 2026, Vol. 26 ›› Issue (4): 626-641.doi: 10.3969/j.issn.1671-1122.2026.04.010
Previous Articles Next Articles
SHU Zhan1,2,3, MA Yilan4, NIE Kaifeng2, LI Zongpeng1,2,3(
)
Received:2025-09-28
Online:2026-04-10
Published:2026-04-29
CLC Number:
SHU Zhan, MA Yilan, NIE Kaifeng, LI Zongpeng. A High-Confidence Assessment Method for Network Alarm Logs Based on OOD Technology[J]. Netinfo Security, 2026, 26(4): 626-641.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2026.04.010
| [1] | WANG Tao, PANG Ruowei, WANG Xu, et al. Assessment of Network Security Alerts Based on Expert Experience[J]. IEEE Access, 2025, 13: 64783-64795. |
| [2] | WANG Jiantao, HE Caifeng, LIU Yijun, et al. Efficient Alarm Behavior Analytics for Telecom Networks[J]. Information Sciences, 2017, 402: 1-14. |
| [3] | LI Shudong, QIN Danyi, WU Xiaobo, et al. False Alert Detection Based on Deep Learning and Machine Learning[J]. International Journal on Semantic Web and Information Systems, 2022, 18(1): 1-21. |
| [4] | GUPTA N, JINDAL V, BEDI P. CSE-IDS: Using Cost-Sensitive Deep Learning and Ensemble Algorithms to Handle Class Imbalance in Network-Based Intrusion Detection Systems[EB/OL].(2021-10-17)[2025-08-20]. https://www.sciencedirect.com/science/article/abs/pii/S0167404821003230. |
| [5] | WU Yirui, WEI Dabao, FENG Jun. Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey[EB/OL].(2020-08-28)[2025-08-20]. https://onlinelibrary.wiley.com/doi/full/10.1155/2020/8872923?msockid=3c0328803ab8642936ab3c6f3bde65aa. |
| [6] | LI Luning, HERRERA M, MUKHERJEE A, et al. Predictive Alarm Models for Improving Radio Access Network Robustness[EB/OL].(2025-01-01)[2025-08-20]. https://dl.acm.org/doi/10.1016/j.eswa.2024.125312. |
| [7] | GUAN Lei, HU Guangjun, WANG Zhuan. Research on Network Security Situational Awareness Technology Based on Big Data[J]. Netinfo Security, 2016, 16(9): 45-50. |
| 管磊, 胡光俊, 王专. 基于大数据的网络安全态势感知技术研究[J]. 信息网络安全, 2016, 16(9):45-50. | |
| [8] | GUO Wei, QIU Han, LIU Zimian, et al. GLD-Net: Deep Learning to Detect DDoS Attack via Topological and Traffic Feature Fusion[EB/OL].(2022-08-16)[2025-08-20]. https://pmc.ncbi.nlm.nih.gov/articles/PMC9398712/. |
| [9] | WANG Yalu, HAN Zhijie, LI Jie, et al. BS-GAT Behavior Similarity Based Graph Attention Network for Network Intrusion Detection[J].(2023-04-07)[2025-08-20]. https://arxiv.org/abs/2304.07226. |
| [10] | DONG Boxiang, CHEN Zhengzhang, WANG Hui, et al. GID: Graph-Based Intrusion Detection on Massive Process Traces for Enterprise Security Systems[EB/OL].(2016-08-08)[2025-08-20]. https://arxiv.org/abs/1608.02639. |
| [11] | WEI Chuyuan, NIU Jianwei, GUO Yanyan. DLGNN: A Double-Layer Graph Neural Network Model Incorporating Shopping Sequence Information for Commodity Recommendation[J]. Sensors and Materials, 2020, 32(12): 4379-4392. |
| [12] | JIANG Kui, LU Lufan, SU Yaoyang, et al. SHDoS Attack Detection Research Based on Attention-GRU[J]. Netinfo Security, 2024, 24(3): 427-437. |
| 江魁, 卢橹帆, 苏耀阳, 等. 基于Attention-GRU的SHDoS攻击检测研究[J]. 信息网络安全, 2024, 24(3): 427-437. | |
| [13] | ALTAF T, WANG Xu, NI Wei, et al. NE-GConv: A Lightweight Node Edge Graph Convolutional Network for Intrusion Detection[EB/OL].(2023-05-06)[2025-08-20]. https://www.sciencedirect.com/science/article/abs/pii/S0167404823001955. |
| [14] | XU Peng, LU Guangyue, LI Yuxin, et al. EE-GCN: A Graph Convolutional Network Based Intrusion Detection Method for IIoT[C]// IEEE. 2023 5th International Conference on Natural Language Processing (ICNLP). New York: IEEE, 2023: 338-344. |
| [15] | LI Yi, CHEN Guo, DONG Zhaoyang. Multi-View Graph Contrastive Representative Learning for Intrusion Detection in EV Charging Station[EB/OL].(2025-05-01)[2025-08-20]. https://www.sciencedirect.com/science/article/pii/S0306261925001692#sec2. |
| [16] | WU Yafeng, XIE Yulai, LIAO Xuelong, et al. Paradise: Real-Time, Generalized, and Distributed Provenance-Based Intrusion Detection[J]. IEEE Transactions on Dependable and Secure Computing, 2023, 20(2): 1624-1640. |
| [17] | HU Xiaoyan, GAO Wenjie, CHENG Guang, et al. Toward Early and Accurate Network Intrusion Detection Using Graph Embedding[J]. IEEE Transactions on Information Forensics and Security, 2023, 18: 5817-5831. |
| [18] | HU Jianwei, ZHAO Wei, YAN Zheng, et al. Analysis and Implementation of SQL Injection Vulnerability Mining Technology Based on Machine Learning[J]. Netinfo Security, 2019, 19(11): 36-42. |
| 胡建伟, 赵伟, 闫峥, 等. 基于机器学习的SQL注入漏洞挖掘技术的分析与实现[J]. 信息网络安全, 2019, 19(11):36-42. | |
| [19] | DEMILIE W B, DERIBA F G. Detection and Prevention of SQLI Attacks and Developing Compressive Framework Using Machine Learning and Hybrid Techniques[EB/OL].(2022-12-30)[2025-09-01]. https://doi.org/10.1186/s40537-022-00678-0. |
| [20] | OUDAH M, MARHUSIN M F. SQL Injection Detection Using Machine Learning: A Review[J]. Malaysian Journal of Science Health & Technology, 2024, 4(10): 39-49. |
| [21] | PHAM B A, VINITHA H S. An Experimental Setup for Detecting SQLi Attacks Using Machine Learning Algorithms[EB/OL].(2020-12-01)[2025-09-01]. https://cisse.info/journal/index.php/cisse/article/view/124. |
| [22] | FAROOQ U. Ensemble Machine Learning Approaches for Detection of SQL Injection Attack[J]. Tehnički Glasnik, 2021, 15(1): 112-120. |
| [23] | OUDAH M A, MOHD F M, ANVAR N. SQL Injection Detection Using Machine Learning with Different TF-IDF Feature Extraction Approaches[C]// Springer. International Conference on Information Systems and Intelligent Applications. Heidelberg: Springer, 2022: 707-720. |
| [24] | TRILOKA J, HARTONO H, SUTEDI S. Detection of SQL Injection Attack Using Machine Learning Based on Natural Language Processing[EB/OL].(2022-08-25)[2025-09-01]. https://www.researchgate.net/publication/362895356_Detection_of_SQL_Injection_Attack_Using_Machine_Learning_Based_On_Natural_Language_Processing. |
| [25] | OLALERE M. A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection Attack[J]. International Journal of Cyber-Security and Digital Forensics, 2018, 7(2): 189-199. |
| [26] | AKINSOLA J E T, EFIONG J E, OLAJUBU E A, et al. Artificial Intelligence-Based Model for Data Security and Mitigation against SQL Injection Attacks in Web Applications[C]// IEEE. 2023 International Conference on Electrical, Computer and Energy Technologies (ICECET). New York: IEEE, 2023: 1-7. |
| [27] | ALKHATHAMI J M, SABAH M A. Detection of SQL Injection Attacks Using Machine Learning in Cloud Computing Platform[EB/OL]. [2025-09-01]. https://www.semanticscholar.org/paper/DETECTION-OF-SQL-INJECTION-ATTACKS-USING-MACHINE-IN-Alkhathami-Alzahrani/8c86ebb40e992f4aedd65f99c8961a76b100d506. |
| [28] | AZMAN M A, MARHUSIN M F, SULAIMAN R. Machine Learning-Based Technique to Detect SQL Injection Attack[J]. Journal of Computer Science, 2021, 17(3): 296-303. |
| [29] | ALGHAWAZI M, ALGHAZZAWI D, ALARIFI S. Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review[J]. Journal of Cybersecurity and Privacy, 2022, 2(4): 764-777. |
| [30] | ABDULMALIK Y. An Improved SQL Injection Attack Detection Model Using Machine Learning Techniques[J]. International Journal of Innovative Computing, 2021, 11(1): 53-57. |
| [31] | HENDRYCKS D, GIMPEL K. A Baseline for Detecting Misclassified and Out-of-Distribution Examples in Neural Networks[EB/OL].(2018-10-03)[2025-09-01]. https://arxiv.org/abs/1610.02136. |
| [32] | LIANG Shiyu, LI Yixuan, SRIKANT R. Enhancing the Reliability of Out-of-Distribution Image Detection in Neural Networks[EB/OL].(2020-08-30)[2025-09-01]. https://arxiv.org/abs/1706.02690. |
| [33] | LIU Weitang, WANG Xiaoyun, OWENS J D, et al. Energy-Based Out-of-Distribution Detection[EB/OL].(2021-04-26)[2025-09-01]. https://arxiv.org/abs/2010.03759. |
| [34] | SUN Yiyou, GUO Chuan, LI Yixuan. ReAct: Out-of-Distribution Detection with Rectified Activations[EB/OL].(2021-11-24)[2025-09-01]. https://arxiv.org/abs/2111.12797. |
| [35] | DENOUDEN T, SALAY R, CZARNECKI K, et al. Improving Reconstruction Autoencoder Out-of-Distribution Detection with Mahalanobis Distance[EB/OL].(2018-12-06)[2025-09-01]. https://arxiv.org/abs/1812.02765. |
| [36] | SUN Yiyou, MING Yifei, ZHU Xiaojin, et al. Out-of-Distribution Detection with Deep Nearest Neighbors[C]// PMLR. The 39th International Conference on Machine Learning. New York: PMLR, 2022: 20827-20840. |
| [37] | PENG Bo, LUO Yadan, ZHANG Yonggang, et al. ConjNorm: Tractable Density Estimation for Out-of-Distribution Detection[EB/OL].(2024-02-27)[2025-09-01]. https://arxiv.org/abs/2402.17888. |
| [38] | MU Fangzhou, LIANG Yingyu, LI Yin. Gradients as Features for Deep Representation Learning[EB/OL].(2020-04-12)[2025-09-01]. https://arxiv.org/abs/2004.05529. |
| [39] | HUANG Rui, GENG A, LI Yixuan. On the Importance of Gradients for Detecting Distributional Shifts in the Wild[EB/OL].(2021-10-01)[2025-09-01]. https://arxiv.org/abs/2110.00218. |
| [40] | MOLCHANOV P, MALLYA A, TYREE S, et al. Importance Estimation for Neural Network Pruning[C]// IEEE. 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). New York: IEEE, 2019: 11256-11264. |
| [41] | RAVI V, CHAGANTI R, ALAZAB M. Recurrent Deep Learning-Based Feature Fusion Ensemble Meta-Classifier Approach for Intelligent Network Intrusion Detection System[EB/OL].(2022-06-17)[2025-09-01]. https://www.sciencedirect.com/science/article/abs/pii/S0045790622004037. |
| [42] | REN Pengzhen, XIAO Yun, CHANG Xiaojun, et al. A Survey of Deep Active Learning[J]. ACM Computing Surveys, 2022, 54(9): 1-40. |
| [43] | SANH V, DEBUT L, CHAUMOND J, et al. DistilBERT, A Distilled Version of BERT: Smaller, Faster, Cheaper and Lighter[EB/OL].(2020-03-01)[2025-09-01]. https://arxiv.org/abs/1910.01108. |
| [44] | JOULIN A, GRAVE E, BOJANOWSKI P, et al. Bag of Tricks for Efficient Text Classification[C]// ACL. The 15th Conference of the European Chapter of the Association for Computational Linguistics (EACL). Stroudsburg: ACL, 2017: 427-431. |
| [1] | CUI Jinhua, DONG Liang, YANG Xin. A Survey of Privacy-Preserving Techniques for Large Language Model Inference [J]. Netinfo Security, 2026, 26(4): 503-520. |
| [2] | LI Hailong, ZHANG Yunhao, SHEN Xieyang, XING Yuhang, CUI Zhian. A Survey of Machine Learning-Based Malware Detection Methods [J]. Netinfo Security, 2026, 26(4): 521-541. |
| [3] | ZHENG Dong, LIU Yanrong, QIN Baodong. A Secure and Scalable Variant-Threshold Multiparty Private Set Intersection Protocol [J]. Netinfo Security, 2026, 26(4): 542-551. |
| [4] | ZHANG Yanshuo, KONG Jiayin, ZHOU Xingyu, QIN Xiaohong, HU Ronglei. A Deniable Ring Signcryption Scheme Based on SM9 [J]. Netinfo Security, 2026, 26(4): 552-565. |
| [5] | YI Wenzhe, XU Xiaoyang, SHI Lei, ZHUANG Yong, WANG Juan. Model Inversion Defense Method Based on Knowledge Transfer and Freezing [J]. Netinfo Security, 2026, 26(4): 566-578. |
| [6] | LI Jinkai, WANG Jingwen, DONG Libo, YAO Wenhan, LIU Chengjie, WEN Weiping. A Blockchain Anomaly Transaction Detection Method Based on Temporal Graph Attention Network [J]. Netinfo Security, 2026, 26(4): 579-590. |
| [7] | LI Yan, YANG Wenzhang, XUE Yinxing. Cross-Language Compiler Fuzzing Based on LLM Translation and Differential Testing [J]. Netinfo Security, 2026, 26(4): 591-604. |
| [8] | YU Miao, GUO Songhui, SONG Shuaichao, YANG Yeming. Research on Graph Neural Network Text Matching Model for Derivative Classification [J]. Netinfo Security, 2026, 26(4): 605-614. |
| [9] | HU Mianning, LI Xin, LI Mingfeng, YUAN Deyu. Research on Multi-Strategy Enhanced Chinese Network Threat Intelligence Entity Extraction Based on Large Language Model [J]. Netinfo Security, 2026, 26(4): 615-625. |
| [10] | YUAN Xiaogang, PEI Huan, AN Dezhi, WAN Jianxin. Research on Deepfake Image Detection Based on Multi-Feature Perception and Attention Mechanism [J]. Netinfo Security, 2026, 26(4): 642-653. |
| [11] | DONG Yingjuan, LYU Ping, LIU Bing. An Automated Penetration Testing System Based on Multi-Agent Architecture [J]. Netinfo Security, 2026, 26(4): 654-664. |
| [12] | YUAN Ming, ZOU Qilin, YUAN Wenqi, WANG Qun. A Survey on Prompt Injection Attacks and Defenses in Large Language Models [J]. Netinfo Security, 2026, 26(3): 341-354. |
| [13] | LI Fujuan, WANG Qun. Research Progress of Cyber Ranges [J]. Netinfo Security, 2026, 26(3): 355-366. |
| [14] | XU Yanwei, TU Min, ZHANG Liang. A Review on the Authenticity Verification of Deepfake Speech [J]. Netinfo Security, 2026, 26(3): 367-377. |
| [15] | HU Wentao, DING Weijie. DiffGuard: Network Traffic Anomaly Detection Based on Diffusion Models and Adaptive Sequence Learning [J]. Netinfo Security, 2026, 26(3): 378-388. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||