3.2ç°åžžæ€åºã®åé¡ã«ãããç»ååé¡
次ã®ã¹ãããã¯ãçµæã®ç»åã®åé¡åé¡ã解決ããããšã§ãã äžè¬ã«ãç»åå ã®ã¯ã©ã¹ïŒãªããžã§ã¯ãïŒãæ€åºããåé¡ã®è§£æ±ºçã¯ãæ©æ¢°åŠç¿ã¢ã«ãŽãªãºã ã䜿çšããŠã¯ã©ã¹ã¢ãã«ãæ§ç¯ããã¢ã«ãŽãªãºã ã䜿çšããŠç»åå ã®ã¯ã©ã¹ïŒãªããžã§ã¯ãïŒãæ€çŽ¢ããããšã§ãã

ã¢ãã«ã®æ§ç¯ã¯ã2ã€ã®æ®µéã§æ§æãããŸãã
aïŒã¯ã©ã¹ã®ç¹åŸŽæœåºïŒã¯ã©ã¹ã¡ã³ããŒã®ç¹åŸŽãã¯ãã«ãããããããŸãã

å³ 1
bïŒåŸç¶ã®èªèã¿ã¹ã¯ã®ããã«ãååŸããã¢ãã«æ©èœã®ãã¬ãŒãã³ã°ã
ã¯ã©ã¹ãªããžã§ã¯ãã¯ãç¹åŸŽãã¯ãã«ã䜿çšããŠèšè¿°ãããŸãã ãã¯ãã«ã¯ä»¥äžãã圢æãããŸãïŒ
aïŒè²æ å ±ïŒæåæ§åŸé ãã¹ãã°ã©ã ïŒ;
bïŒã³ã³ããã¹ãæ å ±ã
cïŒãªããžã§ã¯ãã®éšåã®å¹ŸäœåŠçé 眮ã«é¢ããããŒã¿ã
åé¡ïŒäºæž¬ïŒã¢ã«ãŽãªãºã ã¯ã2ã€ã®æ®µéã«åããããšãã§ããŸãã
aïŒç»åããç¹åŸŽãæœåºããŸãã ãã®æ®µéã§ã2ã€ã®ã¿ã¹ã¯ãå®è¡ãããŸãã
- ç»åã«ã¯å€ãã®ã¯ã©ã¹ã®ãªããžã§ã¯ããå«ãŸããŠããå¯èœæ§ãããããããã¹ãŠã®ä»£è¡šãèŠã€ããå¿ èŠããããŸãã ãããè¡ãã«ã¯ãå·Šäžããå³äžã«ç»åãééããã¹ã©ã€ããŠã£ã³ããŠã䜿çšã§ããŸãã
- ç»åå ã®ãªããžã§ã¯ãã®ã¹ã±ãŒã«ãå€æŽãããå¯èœæ§ããããããç»åã¯ã¹ã±ãŒãªã³ã°ãããŸãã
bïŒç»åãç¹å®ã®ã¯ã©ã¹ã«é¢é£ä»ããã ã¯ã©ã¹ã®æ£åŒãªèª¬æãã€ãŸããã¹ãã€ã¡ãŒãžã§åŒ·èª¿è¡šç€ºãããŠããäžé£ã®æ©èœãå ¥åãšããŠäœ¿çšãããŸãã ãã®æ å ±ã«åºã¥ããŠãåé¡åšã¯ç»åãã¯ã©ã¹ã«å±ããŠãããã©ãããå€æããçµè«ã®ç¢ºå®æ§ã®åºŠåããè©äŸ¡ããŸãã
åé¡æ¹æ³ã åé¡æ¹æ³ã¯ãäž»ã«ãã¥ãŒãªã¹ãã£ãã¯ãªã¢ãããŒããããæ°åŠççµ±èšã®æ¹æ³ã«åºã¥ãæ£åŒãªæé ã«ãŸã§åã³ãŸãã äžè¬çã«åãå ¥ããããŠããåé¡ã¯ãããŸããããç»ååé¡ã«å¯Ÿããããã€ãã®ã¢ãããŒããåºå¥ã§ããŸãã
- 詳现ã«åºã¥ããªããžã§ã¯ãã¢ããªã³ã°ã®æ¹æ³ã
- ãèšèã®è¢ãã®ã¡ãœãã;
- 空éãã©ããããäžèŽãããæ¹æ³ã
ãã®èšäºã§çŽ¹ä»ããå®è£ ã§ã¯ã次ã®çç±ã«ãããèè ã¯ãã¯ãŒãããã°ãã¢ã«ãŽãªãºã ãéžæããŸããã
- 詳现ã«åºã¥ããã¢ããªã³ã°ãšç©ºéãã©ãããã®ãããã³ã°ã®ããã®ã¢ã«ãŽãªãºã ã¯ã空éå ã®èšè¿°åã®äœçœ®ãšãããã®çžå¯Ÿäœçœ®ã«ææã§ãã ãããã®ã¯ã©ã¹ã®ã¡ãœããã¯ãç»åå ã®ãªããžã§ã¯ããæ€åºããã¿ã¹ã¯ã§å¹æçã§ãã ãã ããå ¥åããŒã¿ã®ç¹æ§ã®ãããç»ååé¡ã®åé¡ã«ã¯ããŸãé©çšã§ããŸããã
- ãã¯ãŒããªãã¯ãŒããã¢ã«ãŽãªãºã ã¯ãä»ã®ç¥èåéã§åºããã¹ããããŠãããè¯å¥œãªçµæã瀺ããå®è£ ãéåžžã«ç°¡åã§ãã
ãã©ãã£ãã¯ããæ圱ããããããªã¹ããªãŒã ãåæããããã«ãåçŽãã€ãºåé¡åšã䜿çšããŸãã[25]ã å€ãã®å Žåãã¯ãŒãããã°ã¢ãã«ã䜿çšããŠããã¹ããåé¡ããããã«äœ¿çšãããŸãã ãã®å Žåãã¢ãããŒãã¯ããã¹ãåæã«äŒŒãŠãããåèªã ãã§ãªãèšè¿°åã®ã¿ã䜿çšãããŸãã ãã®åé¡åã®äœæ¥ã¯ããã¬ãŒãã³ã°æ®µéãšäºæž¬æ®µéã®2ã€ã®éšåã«åããããšãã§ããŸãã
åŠç¿ãã§ãŒãº ã åãã¬ãŒã ïŒç»åïŒã¯ãèšè¿°åæ€çŽ¢ã¢ã«ãŽãªãºã ã®å ¥åããã®å Žåã¯ã¹ã±ãŒã«äžå€ç¹åŸŽå€æïŒSIFTïŒ[26]ã«å ¥åãããŸãã ãã®åŸããã¬ãŒã éã®ç¹ç°ç¹ã®çžé¢ã®ã¿ã¹ã¯ãå®è¡ãããŸãã ãªããžã§ã¯ãã®ç»åå ã®ç¹å®ã®ãã€ã³ãã¯ããã®ãªããžã§ã¯ãã®ä»ã®ç»åã«è¡šç€ºãããå¯èœæ§ãé«ããã€ã³ãã§ãã
ç°ãªãç»åå ã®ãªããžã§ã¯ãã®ç¹å¥ãªãã€ã³ããæ¯èŒããåé¡ã解決ããããã«ãèšè¿°åã䜿çšãããŸãã èšè¿°åã¯ããŒã¿æ§é ã§ãããä»ãšåºå¥ããç¹ç°ç¹ã®èå¥åã§ãã ãªããžã§ã¯ãã®ç»åã®å€æã«é¢ããŠäžå€ã§ããå Žåãšäžå€ã§ããå ŽåããããŸãã ç§ãã¡ã®å Žåãèšè¿°åã¯éèŠå€æãã€ãŸãã¹ã±ãŒãªã³ã°ã«é¢ããŠäžå€ã§ãã ãã³ãã«ã䜿çšãããšãããç»åã®ãªããžã§ã¯ãã®ç¹åŸŽç¹ãããã®ãªããžã§ã¯ãã®å¥ã®ç»åã®åãç¹åŸŽç¹ãšæ¯èŒã§ããŸãã
次ã«ããã¹ãŠã®ç»åããåŸãããèšè¿°åã®ã»ããã¯ãk-meansã¯ã©ã¹ã¿ãªã³ã°æ³[26ã27]ã䜿çšããŠãé¡äŒŒæ§ã«ãã£ãŠã°ã«ãŒãã«åé¡ãããŸãã ããã¯åé¡åšãèšç·Žããããã«è¡ãããç»åãç°åžžãªåäœãè¡šããŠãããã©ããã«ã€ããŠçµè«ãåºããŸãã
以äžã¯ãç»åèšè¿°ååé¡åããã¬ãŒãã³ã°ããããã®æ®µéçãªã¢ã«ãŽãªãºã ã§ãã
ã¹ããã1 æ»æã®æç¡ã«ãããããã»ãããããã¹ãŠã®èšè¿°åãæœåºããŸãã
ã¹ããã2 nåã®ã¯ã©ã¹ã¿ãŒã§k-meansæ³ã䜿çšããŠãã¹ãŠã®èšè¿°åãã¯ã©ã¹ã¿ãŒåããŸãã
ã¹ããã3 ãããªãã¯ã¹AïŒmãkïŒã®èšç®ãããã§ãmã¯ç»åã®æ°ãkã¯ã¯ã©ã¹ã¿ãŒã®æ°ã§ãã èŠçŽ ïŒi; jïŒã¯ãjçªç®ã®ã¯ã©ã¹ã¿ãŒã®èšè¿°åãiçªç®ã®ç»åã«è¡šç€ºãããé »åºŠã®å€ãæ ŒçŽããŸãã ãã®ãããªãããªãã¯ã¹ã¯ãçºçé »åºŠã®ãããªãã¯ã¹ãšåŒã°ããŸãã
ã¹ããã4 åŒtf idf [28]ã䜿çšããèšè¿°åã®éã¿ã®èšç®ïŒ

ããã§ãtfïŒãçšèªé »åºŠãïŒã¯ãã®ç»åã®èšè¿°åã®åºçŸé »åºŠã§ããã次ã®ããã«å®çŸ©ãããŸãã

ããã§ãtã¯èšè¿°åãkã¯ç»åå ã®èšè¿°åã®æ°ãntã¯ç»åå ã®èšè¿°åtã®æ°ã§ãã ããã«ãidfïŒãããã¥ã¡ã³ãéåšæ³¢æ°ãïŒã¯ããµã³ãã«å ã®ç¹å®ã®èšè¿°åãæã€éç»ååšæ³¢æ°ã§ããã次ã®ããã«å®çŸ©ãããŸãã

ããã§ãDã¯ãµã³ãã«å ã®ç¹å®ã®èšè¿°åãæã€ç»åã®æ°ã{diâDãtâdi}ã¯Dã®ç»åã®æ°ã§ããããã§ãtã¯ntã§ãã = 0ã
ã¹ããã5 ãããªãã¯ã¹Aã®èšè¿°åã®ä»£ããã«å¯Ÿå¿ããéã¿ãä»£å ¥ããŸãã
ã¹ããã6 åé¡ã åçŽãã€ãºåé¡åšã®å¢å¹ ïŒadaboostïŒã䜿çšããŸãã
ã¹ããã7 ãã¬ãŒãã³ã°æžã¿ã¢ãã«ããã¡ã€ã«ã«ä¿åããŸãã
ã¹ããã8 ããã§ãã¬ãŒãã³ã°ãã§ãŒãºã¯çµäºã§ãã
äºæž¬ãã§ãŒãº ã ãã¬ãŒãã³ã°ãã§ãŒãºãšäºæž¬ãã§ãŒãºã®éãã¯ãããã§ããèšè¿°åã¯ç»åããæœåºãããæ¢åã®ã°ã«ãŒããšé¢é£ä»ããããŸãã ãã®æ¯çã«åºã¥ããŠããã¯ãã«ãæ§ç¯ãããŸãã ãã®ãã¯ãã«ã®åèŠçŽ ã¯ãç»åå ã®ãã®ã°ã«ãŒãã®èšè¿°åã®åºçŸé »åºŠã§ãã ãã®ãã¯ãã«ãåæããããšã«ãããåé¡åšã¯ç¹å®ã®ç¢ºçã§æ»æäºæž¬ãè¡ãããšãã§ããŸãã
åé¡åšã®ãã¢ã«åºã¥ãäžè¬çãªäºæž¬ã¢ã«ãŽãªãºã ã以äžã«ç€ºããŸãã
ã¹ããã1 ç»åãããã¹ãŠã®èšè¿°åãæœåºããŸãã
ã¹ããã2 èšè¿°åã®çµæã»ãããã¯ã©ã¹ã¿ãªã³ã°ããŸãã
ã¹ããã3 ãã¯ãã«[1ãk]ã®èšç®ã
ã¹ããã4 äžèšã®åŒtf idfã«ããåèšè¿°åã®éã¿ã®èšç®ã
ã¹ããã5 ãã¯ãã«ã®åºçŸé »åºŠããã®éã¿ã§çœ®ãæããã
ã¹ããã6 以åã«èšç·Žãããåé¡åšã«ããçµæãã¯ãã«ã®åé¡ã
ã¹ããã7 åé¡åã®äºæž¬ã«åºã¥ãã芳枬ããããããã¯ãŒã¯å ã®ç°åžžã®ååšã«é¢ããçµè«ã
4.æ€åºå¹çã®è©äŸ¡
ææ¡ãããæ¹æ³ã®æå¹æ§ãè©äŸ¡ããã¿ã¹ã¯ã¯ãå®éšçã«è§£æ±ºãããŸããã å®éšã§ã¯ãå®éšçã«ç¢ºç«ãããå€ãã®ãã©ã¡ãŒã¿ãŒã䜿çšãããŸããã ã¯ã©ã¹ã¿ãªã³ã°ã«ã¯ã1000åã®ã¯ã©ã¹ã¿ãŒã䜿çšãããŸããã çæãããç»åã¯1000 x 1000ãã¯ã»ã«ã§ããã
4.1å®éšããŒã¿ã»ãã
å®éšã®ããã«ãã€ã³ã¹ããŒã«ãçµã¿ç«ãŠãããŸããã ããã¯ãéä¿¡ãã£ãã«ã§æ¥ç¶ããã3ã€ã®ããã€ã¹ã§æ§æãããŠããŸãã ã€ã³ã¹ããŒã«ã®ãããã¯å³ãå³2ã«ç€ºããŸãã

å³1
SRVããã€ã¹ã¯æ»æãµãŒããŒãšããŠæ©èœããŸãïŒä»¥éãã¿ãŒã²ãããµãŒããŒãšåŒã³ãŸãïŒã SRVã³ãŒããšãšãã«è¡š1ã«ãªã¹ããããŠããããã€ã¹ã¯ãã¿ãŒã²ãããµãŒããŒãšããŠé 次䜿çšãããŸããã 2çªç®ã¯ããããã¯ãŒã¯ãã±ãããéä¿¡ããããã«èšèšããããããã¯ãŒã¯ããã€ã¹ã§ãã ããã€ã¹ã®ç¹æ§ã¯ãã³ãŒãND-1ã§è¡š1ã«ç€ºãããŠããŸãã
è¡š1.ãããã¯ãŒã¯ããã€ã¹ã®ä»æ§

ã¿ãŒã²ãããµãŒããŒã§ã¯ãåŸã§çºèŠã¢ã«ãŽãªãºã ã§äœ¿çšããããã«ããããã¯ãŒã¯ãã±ãããPCAPãã¡ã€ã«ã«æžã蟌ãŸããŸããã ãã®ã¿ã¹ã¯ã«ã¯tcpdumpãŠãŒãã£ãªãã£ã䜿çšãããŸããã ããŒã¿ã»ããã«ã€ããŠã¯ãè¡š2ã§èª¬æããŠããŸãã
è¡š2.ååããããããã¯ãŒã¯ãã±ããã®ã»ãã

次ã®ãœãããŠã§ã¢ãã¿ãŒã²ãããµãŒããŒã§äœ¿çšãããŸããïŒLinuxãã£ã¹ããªãã¥ãŒã·ã§ã³ãnginx 1.10.3 WebãµãŒããŒãpostgresql 9.6 DBMSã ã·ã¹ãã ã®èµ·åããšãã¥ã¬ãŒãããããã®ç¹å¥ãªWebã¢ããªã±ãŒã·ã§ã³ãäœæãããŸããã ã¢ããªã±ãŒã·ã§ã³ã¯ã倧éã®ããŒã¿ãå«ãããŒã¿ããŒã¹ãèŠæ±ããŸãã èŠæ±ã¯ãããŸããŸãªãã£ãã·ã¥ã®äœ¿çšãæå°éã«æããããã«èšèšãããŠããŸãã å®éšäžã«ããã®Webã¢ããªã±ãŒã·ã§ã³ã«å¯ŸããèŠæ±ãçæãããŸããã
æ»æã¯ãApache BenchmarkãŠãŒãã£ãªãã£ã䜿çšããŠ3çªç®ã®ã¯ã©ã€ã¢ã³ãããã€ã¹ïŒè¡š1ïŒããè¡ãããŸããã æ»æäžããã³ãã®ä»ã®æéã®ããã¯ã°ã©ãŠã³ããã©ãã£ãã¯ã®æ§é ãè¡š3ã«ç€ºããŸãã
è¡š3.ããã¯ã°ã©ãŠã³ããã©ãã£ãã¯é¢æ°

æ»æãšããŠãHTTP GET Floodã®åæ£DoSããŒãžã§ã³ãå®è£ ããŸãã å®éããã®ãããªæ»æã¯ãGETãªã¯ãšã¹ãã®äžå®ã®ã¹ããªãŒã ã®çæã§ããããã®å Žåã¯CD-1ããã€ã¹ããã®ãã®ã§ãã ãããçæããããã«ãapache-utilsããã±ãŒãžã®abãŠãŒãã£ãªãã£ã䜿çšããŸããã ãã®çµæããããã¯ãŒã¯ã®ã¹ããŒã¿ã¹ã«é¢ããæ å ±ãå«ããã¡ã€ã«ãåä¿¡ãããŸããã ãããã®ãã¡ã€ã«ã®äž»ãªç¹åŸŽãè¡š2ã«ç€ºããŸããæ»æã·ããªãªã®äž»ãªãã©ã¡ãŒã¿ãŒãè¡š4ã«ç€ºããŸãã
ååŸããããããã¯ãŒã¯ãã©ãã£ãã¯ãã³ããããçæãããç»åã®ã»ããTDïŒ1ããã³TDïŒ2ãååŸããããã¬ãŒãã³ã°æ®µéã§äœ¿çšãããŸããã ãµã³ãã«TDïŒ3ãäºæž¬ãã§ãŒãºã«äœ¿çšãããŸããã ãã¹ãããŒã¿ã»ããã®æŠèŠãè¡š5ã«ç€ºããŸãã
4.2æ§èœåºæº
ãã®èª¿æ»äžã«è©äŸ¡ãããäž»ãªãã©ã¡ãŒã¿ãŒã¯æ¬¡ã®ãšããã§ãã
è¡š4. DDoSæ»æã®æ©èœ

è¡š5.ãã¹ãã€ã¡ãŒãžã»ãã

aïŒDRïŒæ€åºçïŒ-æ»æã®ç·æ°ã«å¯Ÿããæ€åºãããæ»æã®æ°ã ãã®ãã©ã¡ãŒã¿ãŒãé«ãã»ã©ãADSã®å¹çãšå質ãé«ããªããŸãã
bïŒFPRïŒFalse Positive RateïŒ-ãæ£åžžãªããªããžã§ã¯ãã®ç·æ°ã«å¯Ÿãããæ»æãšããŠèª€ã£ãŠåé¡ããããæ£åžžãªããªããžã§ã¯ãã®æ°ã ãã®ãã©ã¡ãŒã¿ãäœãã»ã©ãç°åžžæ€åºã·ã¹ãã ã®å¹çãšå質ãé«ããªããŸãã
cïŒCRïŒè€åã¬ãŒãïŒã¯ãDRããã³FPRãã©ã¡ãŒã¿ãŒã®çµã¿åãããèæ ®ããè€éãªææšã§ãã ç 究ã§ã¯ãã©ã¡ãŒã¿ãŒDRãšFPRã®éèŠæ§ãçãããªã£ãŠãããããCR =ïŒDR + FPRïŒ/ 2ã
ãç°åžžããšããŒã¯ããã1000åã®ç»åãåé¡åšã«éä¿¡ãããŸããã èªèçµæã«åºã¥ããŠããã¬ãŒãã³ã°ãµã³ãã«ã®ãµã€ãºã«å¿ããŠDRãèšç®ãããŸããã 次ã®å€ãåŸãããŸããïŒTDïŒ1ã®å ŽåDR = 9.5ïŒ ãTDïŒ2ã®å ŽåDR = 98.4ïŒ ã ããã«ãç»åã®åŸåïŒãæ£åžžãïŒãåé¡ãããŸããã çµæã«åºã¥ããŠãFPRãèšç®ãããŸããïŒTDïŒ1 FPR = 3.2ïŒ ãTDïŒ2 FPR = 4.3ïŒ ïŒã ãããã£ãŠã次ã®å æ¬çãªããã©ãŒãã³ã¹ææšãåŸãããŸããïŒTDïŒ1 CR = 53.15ïŒ ãTDïŒ2 CR = 97.05ïŒ ã
5.çµè«ãšä»åŸã®ç 究
å®éšçµæãããç°åžžãæ€åºããããã«ææ¡ãããæ¹æ³ã¯ãæ»æã®æ€åºã«ãããŠé«ãçµæã瀺ãããšãããããŸãã ããšãã°ã倧èŠæš¡ãªãµã³ãã«ã§ã¯ãââå æ¬çãªããã©ãŒãã³ã¹ã€ã³ãžã±ãŒã¿ãŒã®å€ã¯97ïŒ ã«éããŸãã ãã ãããã®æ¹æ³ã«ã¯ã¢ããªã±ãŒã·ã§ã³ã«ããã€ãã®å¶éããããŸãã
1. DRãšFPRã®å€ã¯ããã¬ãŒãã³ã°ã»ããã®ãµã€ãºã«å¯Ÿããã¢ã«ãŽãªãºã ã®æ床ã瀺ããŠããŸããããã¯ãæ©æ¢°åŠç¿ã¢ã«ãŽãªãºã ã®æŠå¿µçãªåé¡ã§ãã ãµã³ãã«ãå¢ãããšãæ€åºããã©ãŒãã³ã¹ãåäžããŸãã ãã ããç¹å®ã®ãããã¯ãŒã¯ã«å¯ŸããŠååã«å€§ããªãã¬ãŒãã³ã°ã»ãããå®è£ ã§ãããšã¯éããŸããã
2.éçºãããã¢ã«ãŽãªãºã ã¯æ±ºå®è«çã§ãããåãç»åãæ¯ååãçµæã§åé¡ãããŸãã
3.ã¢ãããŒãã®æå¹æ§ææšã¯ãã³ã³ã»ããã確èªããã®ã«ååã§ããã誀æ€ç¥ã®æ°ãå€ããå®éã®å®è£ ãå°é£ã«ãªãå¯èœæ§ããããŸãã
äžèšã®å¶éïŒãã€ã³ã3ïŒãå æããããã«ããã€ãŒããã€ãžã¢ã³åé¡åšãç³ã¿èŸŒã¿ãã¥ãŒã©ã«ãããã¯ãŒã¯ã«å€æŽããããšãæ³å®ãããŠãããèè ã«ããã°ãç°åžžæ€åºã¢ã«ãŽãªãºã ã®ç²ŸåºŠãé«ããå¿ èŠããããŸãã
åç
§è³æ
1. Mohiuddin A.ãAbdun NMãJiankun H .:ãããã¯ãŒã¯ç°åžžæ€åºæè¡ã®èª¿æ»ã InïŒJournal of Network and Computer Applicationsã å·» 60ãpã 21ïŒ2016ïŒ
2. Afontsev EãïŒãããã¯ãŒã¯ç°åžžã2006 nag.ru/articles/reviews/15588 setevyie-anomalii.html
3. Berestov AAïŒã€ã³ã¿ãŒãããäžã®ãŠã€ã«ã¹æ»æããä¿è·ããããã®å®åã·ã¹ãã ã«åºã¥ãã€ã³ããªãžã§ã³ããšãŒãžã§ã³ãã®ã¢ãŒããã¯ãã£ã InïŒXVå šãã·ã¢ç§åŠäŒè°é«çåŠæ ¡ã·ã¹ãã ã«ãããæ å ±ã»ãã¥ãªãã£ã®åé¡ããppã 180ïŒ276ïŒ2008ïŒ
4. Galtsev AVïŒç°åžžãªãããã¯ãŒã¯ç¶æ ãç¹å®ããããã®ãã©ãã£ãã¯ã®ã·ã¹ãã åæïŒæè¡ç§åŠåè£ã®è«æã ãµããŒã©ïŒ2013ïŒ
5. Kornienko AAãSlyusarenko IMïŒäŸµå ¥æ€ç¥ã·ã¹ãã ããã³æ¹æ³ïŒçŸç¶ãšæ¹åã®æ¹åã2008 citforum.ru/security internet / ids overview /
6. Kussul N.ãSokolov AãïŒå¯å€é åºã®ãã«ã³ãé£éã䜿çšããã³ã³ãã¥ãŒã¿ãŒã·ã¹ãã ãŠãŒã¶ãŒã®è¡åã«ãããé©å¿ç°åžžæ€åºã ããŒã2ïŒç°åžžã®æ€åºæ¹æ³ãšå®éšçµæã InïŒæ å ±ãšå¶åŸ¡ã®åé¡ã åé¡4ãããŒãžã 83ïŒ88ïŒ2003ïŒ
7. Mirkes EMïŒãã¥ãŒãã³ã³ãã¥ãŒã¿ãŒïŒãã©ããæšæºã ç§åŠãããã·ãã«ã¹ã¯ãppã 150-176ïŒ1999ïŒ
8. Tsvirko DAçç£ã¢ãã«ææ³ã䜿çšãããããã¯ãŒã¯æ»æã«ãŒãã®äºæž¬ã2012 academy.kaspersky.com/downloads/academycupåå è / cvirko dã ppt
9. Somayaji AãïŒã·ã¹ãã ã³ãŒã«é 延ã䜿çšããèªåå¿çã InïŒUSENIX Security Symposium 2000ãppã 185-197ã2000
10. Ilgun KãïŒUSTATïŒUNIXçšã®ãªã¢ã«ã¿ã€ã äŸµå ¥æ€ç¥ã·ã¹ãã ã ã§ïŒã»ãã¥ãªãã£ãšãã©ã€ãã·ãŒã®ç 究ã«é¢ããIEEEã·ã³ããžãŠã ãã«ãªãã©ã«ãã¢å€§åŠïŒ1992ïŒ
11. Eskin E.ãLee W.ãããã³Stolfo SJïŒã¢ããªã³ã°ã·ã¹ãã ã¯ãåçãªãŠã£ã³ããŠãµã€ãºã§ã®äŸµå ¥æ€ç¥ãèŠæ±ããŸãã InïŒDARPA Information Survivability Conference and ExpositionïŒDISCEX IIïŒã2001幎6æ
12. Ye N.ãXu M.ãããã³Emran SMïŒç°åžžæ€åºã®ããã®ç¡åãªã³ã¯ãåãã確ççãããã¯ãŒã¯ã InïŒ2000 IEEE Workshop on Information Assurance and SecurityãWest PointãNYïŒ2000ïŒ
13. Michael CCãšGhosh AãïŒããã°ã©ã ããŒã¹ã®ç°åžžæ€åºã«å¯Ÿãã2ã€ã®ç¶æ ããŒã¹ã®ã¢ãããŒãã InïŒæ å ±ãšã·ã¹ãã ã»ãã¥ãªãã£ã«é¢ããACMãã©ã³ã¶ã¯ã·ã§ã³ã ãã 5ïŒ2ïŒã2002
14. Garvey TDãLunt TFïŒã¢ãã«ããŒã¹ã®äŸµå ¥æ€ç¥ã ã§ïŒç¬¬14ååœå®¶ã³ã³ãã¥ãŒã¿ãŒã»ãã¥ãªãã£äŒè°ãã¡ãªãŒã©ã³ãå·ãã«ãã¢ã¢ïŒ1991ïŒ
15. Theus M.ããã³Schonlau MãïŒæ§é ãŒãã«åºã¥ãäŸµå ¥æ€ç¥ã InïŒçµ±èšã³ã³ãã¥ãŒãã£ã³ã°ããã³ã°ã©ãã£ãã¯ãã¥ãŒã¹ã¬ã¿ãŒã ãã 9ïŒ1ïŒãppã 12ïŒ17ïŒ1998ïŒ
16. Tan KãïŒUnixã³ã³ãã¥ãŒã¿ã»ãã¥ãªãã£ãžã®ãã¥ãŒã©ã«ãããã¯ãŒã¯ã®é©çšã InïŒãã¥ãŒã©ã«ãããã¯ãŒã¯ã«é¢ããIEEEåœéäŒè°ã å·» 1ãppã 476ïŒ481ãããŒã¹ããªãŒã¹ãã©ãªã¢ïŒ1995ïŒ
17. Ilgun K.ãKemmerer RAãPorras PAïŒç¶æ é·ç§»åæïŒã«ãŒã«ããŒã¹ã®äŸµå ¥æ€ç¥ã·ã¹ãã ã InïŒIEEE Transã ãœãããŠã§ã¢å·¥åŠ å·» 21ããããã 3ãïŒ1995ïŒ
18. Eskin EãïŒåŠç¿ãã確çååžã䜿çšãããã€ãºã®å€ãããŒã¿ã«å¯Ÿããç°åžžæ€åºã ã§ïŒ17th International Confã æ©æ¢°åŠç¿ã«ã€ããŠãppã 255ïŒ262ã ã¢ãŒã¬ã³ã»ã«ãŠããã³ããµã³ãã©ã³ã·ã¹ã³ãã«ãªãã©ã«ãã¢ïŒ2000ïŒ
19. Ghosh K.ãSchwartzbard A.ãããã³Schatz MãïŒäŸµå ¥æ€ç¥ã®ããã®ããã°ã©ã åäœãããã¡ã€ã«ã®åŠç¿ã InïŒäŸµå ¥æ€ç¥ãšãããã¯ãŒã¯ç£èŠã«é¢ãã第1åUSENIXã¯ãŒã¯ã·ã§ãããppã 51ïŒ62ããµã³ã¿ã¯ã©ã©ãã«ãªãã©ã«ãã¢ïŒ1999ïŒ
20. Ye NãïŒç°åžžæ€åºã®æéçæåã®ãã«ã³ãé£éã¢ãã«ã ã§ïŒ2000 IEEE SystemsãManãand CyberââneticsãInformation Assurance and Security WorkshopïŒ2000ïŒ
21. Axelsson SãïŒäŸµå ¥æ€ç¥ã®é£ããã«å¯Ÿããåºæ¬ã¬ãŒãã®èª€acyãšãã®æå³ã InïŒACM Conference on Computer and Communications Securityãppã 1ïŒ7ïŒ1999ïŒ
22. Chikalov IãMoshkov MãZielosko BãïŒåçèšç»æ³ã«åºã¥ã決å®ã«ãŒã«ã®æé©åã ããžãã»ããŽãŽããã®ãããã§ãã¹ããŒå·ç«å€§åŠã®ãŽã§ã¹ããã¯ã§ããããã 6ãppã 195-200
23. Chen CHïŒãã¿ãŒã³èªèãšã³ã³ãã¥ãŒã¿ãŒããžã§ã³ã®ãã³ãããã¯ã ããµãã¥ãŒã»ãã倧åŠããŒããã¹ãã¢ã¡ãªã«ïŒ2015ïŒ
24. Gantmacher FRïŒè¡åã®çè«ãpã 227.ç§åŠãã¢ã¹ã¯ã¯ïŒ1968ïŒ
25. Murty MNãDevi VSïŒãã¿ãŒã³èªèïŒã¢ã«ãŽãªãºã ã Ppã 93-94ïŒ2011ïŒ
2. Afontsev EãïŒãããã¯ãŒã¯ç°åžžã2006 nag.ru/articles/reviews/15588 setevyie-anomalii.html
3. Berestov AAïŒã€ã³ã¿ãŒãããäžã®ãŠã€ã«ã¹æ»æããä¿è·ããããã®å®åã·ã¹ãã ã«åºã¥ãã€ã³ããªãžã§ã³ããšãŒãžã§ã³ãã®ã¢ãŒããã¯ãã£ã InïŒXVå šãã·ã¢ç§åŠäŒè°é«çåŠæ ¡ã·ã¹ãã ã«ãããæ å ±ã»ãã¥ãªãã£ã®åé¡ããppã 180ïŒ276ïŒ2008ïŒ
4. Galtsev AVïŒç°åžžãªãããã¯ãŒã¯ç¶æ ãç¹å®ããããã®ãã©ãã£ãã¯ã®ã·ã¹ãã åæïŒæè¡ç§åŠåè£ã®è«æã ãµããŒã©ïŒ2013ïŒ
5. Kornienko AAãSlyusarenko IMïŒäŸµå ¥æ€ç¥ã·ã¹ãã ããã³æ¹æ³ïŒçŸç¶ãšæ¹åã®æ¹åã2008 citforum.ru/security internet / ids overview /
6. Kussul N.ãSokolov AãïŒå¯å€é åºã®ãã«ã³ãé£éã䜿çšããã³ã³ãã¥ãŒã¿ãŒã·ã¹ãã ãŠãŒã¶ãŒã®è¡åã«ãããé©å¿ç°åžžæ€åºã ããŒã2ïŒç°åžžã®æ€åºæ¹æ³ãšå®éšçµæã InïŒæ å ±ãšå¶åŸ¡ã®åé¡ã åé¡4ãããŒãžã 83ïŒ88ïŒ2003ïŒ
7. Mirkes EMïŒãã¥ãŒãã³ã³ãã¥ãŒã¿ãŒïŒãã©ããæšæºã ç§åŠãããã·ãã«ã¹ã¯ãppã 150-176ïŒ1999ïŒ
8. Tsvirko DAçç£ã¢ãã«ææ³ã䜿çšãããããã¯ãŒã¯æ»æã«ãŒãã®äºæž¬ã2012 academy.kaspersky.com/downloads/academycupåå è / cvirko dã ppt
9. Somayaji AãïŒã·ã¹ãã ã³ãŒã«é 延ã䜿çšããèªåå¿çã InïŒUSENIX Security Symposium 2000ãppã 185-197ã2000
10. Ilgun KãïŒUSTATïŒUNIXçšã®ãªã¢ã«ã¿ã€ã äŸµå ¥æ€ç¥ã·ã¹ãã ã ã§ïŒã»ãã¥ãªãã£ãšãã©ã€ãã·ãŒã®ç 究ã«é¢ããIEEEã·ã³ããžãŠã ãã«ãªãã©ã«ãã¢å€§åŠïŒ1992ïŒ
11. Eskin E.ãLee W.ãããã³Stolfo SJïŒã¢ããªã³ã°ã·ã¹ãã ã¯ãåçãªãŠã£ã³ããŠãµã€ãºã§ã®äŸµå ¥æ€ç¥ãèŠæ±ããŸãã InïŒDARPA Information Survivability Conference and ExpositionïŒDISCEX IIïŒã2001幎6æ
12. Ye N.ãXu M.ãããã³Emran SMïŒç°åžžæ€åºã®ããã®ç¡åãªã³ã¯ãåãã確ççãããã¯ãŒã¯ã InïŒ2000 IEEE Workshop on Information Assurance and SecurityãWest PointãNYïŒ2000ïŒ
13. Michael CCãšGhosh AãïŒããã°ã©ã ããŒã¹ã®ç°åžžæ€åºã«å¯Ÿãã2ã€ã®ç¶æ ããŒã¹ã®ã¢ãããŒãã InïŒæ å ±ãšã·ã¹ãã ã»ãã¥ãªãã£ã«é¢ããACMãã©ã³ã¶ã¯ã·ã§ã³ã ãã 5ïŒ2ïŒã2002
14. Garvey TDãLunt TFïŒã¢ãã«ããŒã¹ã®äŸµå ¥æ€ç¥ã ã§ïŒç¬¬14ååœå®¶ã³ã³ãã¥ãŒã¿ãŒã»ãã¥ãªãã£äŒè°ãã¡ãªãŒã©ã³ãå·ãã«ãã¢ã¢ïŒ1991ïŒ
15. Theus M.ããã³Schonlau MãïŒæ§é ãŒãã«åºã¥ãäŸµå ¥æ€ç¥ã InïŒçµ±èšã³ã³ãã¥ãŒãã£ã³ã°ããã³ã°ã©ãã£ãã¯ãã¥ãŒã¹ã¬ã¿ãŒã ãã 9ïŒ1ïŒãppã 12ïŒ17ïŒ1998ïŒ
16. Tan KãïŒUnixã³ã³ãã¥ãŒã¿ã»ãã¥ãªãã£ãžã®ãã¥ãŒã©ã«ãããã¯ãŒã¯ã®é©çšã InïŒãã¥ãŒã©ã«ãããã¯ãŒã¯ã«é¢ããIEEEåœéäŒè°ã å·» 1ãppã 476ïŒ481ãããŒã¹ããªãŒã¹ãã©ãªã¢ïŒ1995ïŒ
17. Ilgun K.ãKemmerer RAãPorras PAïŒç¶æ é·ç§»åæïŒã«ãŒã«ããŒã¹ã®äŸµå ¥æ€ç¥ã·ã¹ãã ã InïŒIEEE Transã ãœãããŠã§ã¢å·¥åŠ å·» 21ããããã 3ãïŒ1995ïŒ
18. Eskin EãïŒåŠç¿ãã確çååžã䜿çšãããã€ãºã®å€ãããŒã¿ã«å¯Ÿããç°åžžæ€åºã ã§ïŒ17th International Confã æ©æ¢°åŠç¿ã«ã€ããŠãppã 255ïŒ262ã ã¢ãŒã¬ã³ã»ã«ãŠããã³ããµã³ãã©ã³ã·ã¹ã³ãã«ãªãã©ã«ãã¢ïŒ2000ïŒ
19. Ghosh K.ãSchwartzbard A.ãããã³Schatz MãïŒäŸµå ¥æ€ç¥ã®ããã®ããã°ã©ã åäœãããã¡ã€ã«ã®åŠç¿ã InïŒäŸµå ¥æ€ç¥ãšãããã¯ãŒã¯ç£èŠã«é¢ãã第1åUSENIXã¯ãŒã¯ã·ã§ãããppã 51ïŒ62ããµã³ã¿ã¯ã©ã©ãã«ãªãã©ã«ãã¢ïŒ1999ïŒ
20. Ye NãïŒç°åžžæ€åºã®æéçæåã®ãã«ã³ãé£éã¢ãã«ã ã§ïŒ2000 IEEE SystemsãManãand CyberââneticsãInformation Assurance and Security WorkshopïŒ2000ïŒ
21. Axelsson SãïŒäŸµå ¥æ€ç¥ã®é£ããã«å¯Ÿããåºæ¬ã¬ãŒãã®èª€acyãšãã®æå³ã InïŒACM Conference on Computer and Communications Securityãppã 1ïŒ7ïŒ1999ïŒ
22. Chikalov IãMoshkov MãZielosko BãïŒåçèšç»æ³ã«åºã¥ã決å®ã«ãŒã«ã®æé©åã ããžãã»ããŽãŽããã®ãããã§ãã¹ããŒå·ç«å€§åŠã®ãŽã§ã¹ããã¯ã§ããããã 6ãppã 195-200
23. Chen CHïŒãã¿ãŒã³èªèãšã³ã³ãã¥ãŒã¿ãŒããžã§ã³ã®ãã³ãããã¯ã ããµãã¥ãŒã»ãã倧åŠããŒããã¹ãã¢ã¡ãªã«ïŒ2015ïŒ
24. Gantmacher FRïŒè¡åã®çè«ãpã 227.ç§åŠãã¢ã¹ã¯ã¯ïŒ1968ïŒ
25. Murty MNãDevi VSïŒãã¿ãŒã³èªèïŒã¢ã«ãŽãªãºã ã Ppã 93-94ïŒ2011ïŒ
äŒçµ±çã«ãç§ãã¡ã¯ããªãã®ã³ã¡ã³ããåŸ ã£ãŠãããæ¥é±ã®æææ¥ã«éå¬ããããªãŒãã³ããŒã«çãããæåŸ ããŸãã