The cross-evaluation of machine learning-based network intrusion detection systems
Enhancing Network Intrusion Detection Systems (NIDS) with supervised Machine Learning
(ML) is tough. ML-NIDS must be trained and evaluated, operations requiring data where …
(ML) is tough. ML-NIDS must be trained and evaluated, operations requiring data where …
A taxonomy of network threats and the effect of current datasets on intrusion detection systems
As the world moves towards being increasingly dependent on computers and automation,
building secure applications, systems and networks are some of the main challenges faced …
building secure applications, systems and networks are some of the main challenges faced …
IMIDS: An intelligent intrusion detection system against cyber threats in IoT
The increasing popularity of the Internet of Things (IoT) has significantly impacted our daily
lives in the past few years. On one hand, it brings convenience, simplicity, and efficiency for …
lives in the past few years. On one hand, it brings convenience, simplicity, and efficiency for …
Synthetic attack data generation model applying generative adversarial network for intrusion detection
Detecting a large number of attack classes accurately applying machine learning (ML) and
deep learning (DL) techniques depends on the number of representative samples available …
deep learning (DL) techniques depends on the number of representative samples available …
Towards a reliable comparison and evaluation of network intrusion detection systems based on machine learning approaches
Presently, we are living in a hyper-connected world where millions of heterogeneous
devices are continuously sharing information in different application contexts for wellness …
devices are continuously sharing information in different application contexts for wellness …
Datasets are not enough: Challenges in labeling network traffic
In contrast to previous surveys, the present work is not focused on reviewing the datasets
used in the network security field. The fact is that many of the available public labeled …
used in the network security field. The fact is that many of the available public labeled …
Generating network intrusion detection dataset based on real and encrypted synthetic attack traffic
A Ferriyan, AH Thamrin, K Takeda, J Murai - applied sciences, 2021 - mdpi.com
The lack of publicly available up-to-date datasets contributes to the difficulty in evaluating
intrusion detection systems. This paper introduces HIKARI-2021, a dataset that contains …
intrusion detection systems. This paper introduces HIKARI-2021, a dataset that contains …
A cloud based optimization method for zero-day threats detection using genetic algorithm and ensemble learning
This article presents a cloud-based method to classify 0-day attacks from a novel dataset
called UGRansome1819. The primary objective of the research is to classify potential …
called UGRansome1819. The primary objective of the research is to classify potential …
SoK: The impact of unlabelled data in cyberthreat detection
G Apruzzese, P Laskov… - 2022 IEEE 7th European …, 2022 - ieeexplore.ieee.org
Machine learning (ML) has become an important paradigm for cyberthreat detection (CTD)
in the recent years. A substantial research effort has been invested in the development of …
in the recent years. A substantial research effort has been invested in the development of …
Ugransome1819: A novel dataset for anomaly detection and zero-day threats
This research attempts to introduce the production methodology of an anomaly detection
dataset using ten desirable requirements. Subsequently, the article presents the produced …
dataset using ten desirable requirements. Subsequently, the article presents the produced …