The cross-evaluation of machine learning-based network intrusion detection systems

G Apruzzese, L Pajola, M Conti - IEEE Transactions on Network …, 2022 - ieeexplore.ieee.org
Enhancing Network Intrusion Detection Systems (NIDS) with supervised Machine Learning
(ML) is tough. ML-NIDS must be trained and evaluated, operations requiring data where …

A taxonomy of network threats and the effect of current datasets on intrusion detection systems

H Hindy, D Brosset, E Bayne, AK Seeam… - IEEE …, 2020 - ieeexplore.ieee.org
As the world moves towards being increasingly dependent on computers and automation,
building secure applications, systems and networks are some of the main challenges faced …

IMIDS: An intelligent intrusion detection system against cyber threats in IoT

KH Le, MH Nguyen, TD Tran, ND Tran - Electronics, 2022 - mdpi.com
The increasing popularity of the Internet of Things (IoT) has significantly impacted our daily
lives in the past few years. On one hand, it brings convenience, simplicity, and efficiency for …

Synthetic attack data generation model applying generative adversarial network for intrusion detection

V Kumar, D Sinha - Computers & Security, 2023 - Elsevier
Detecting a large number of attack classes accurately applying machine learning (ML) and
deep learning (DL) techniques depends on the number of representative samples available …

Towards a reliable comparison and evaluation of network intrusion detection systems based on machine learning approaches

R Magán-Carrión, D Urda, I Díaz-Cano, B Dorronsoro - Applied Sciences, 2020 - mdpi.com
Presently, we are living in a hyper-connected world where millions of heterogeneous
devices are continuously sharing information in different application contexts for wellness …

Datasets are not enough: Challenges in labeling network traffic

JL Guerra, C Catania, E Veas - Computers & Security, 2022 - Elsevier
In contrast to previous surveys, the present work is not focused on reviewing the datasets
used in the network security field. The fact is that many of the available public labeled …

Generating network intrusion detection dataset based on real and encrypted synthetic attack traffic

A Ferriyan, AH Thamrin, K Takeda, J Murai - applied sciences, 2021 - mdpi.com
The lack of publicly available up-to-date datasets contributes to the difficulty in evaluating
intrusion detection systems. This paper introduces HIKARI-2021, a dataset that contains …

A cloud based optimization method for zero-day threats detection using genetic algorithm and ensemble learning

M Nkongolo, JP Van Deventer, SM Kasongo, SR Zahra… - Electronics, 2022 - mdpi.com
This article presents a cloud-based method to classify 0-day attacks from a novel dataset
called UGRansome1819. The primary objective of the research is to classify potential …

SoK: The impact of unlabelled data in cyberthreat detection

G Apruzzese, P Laskov… - 2022 IEEE 7th European …, 2022 - ieeexplore.ieee.org
Machine learning (ML) has become an important paradigm for cyberthreat detection (CTD)
in the recent years. A substantial research effort has been invested in the development of …

Ugransome1819: A novel dataset for anomaly detection and zero-day threats

M Nkongolo, JP Van Deventer, SM Kasongo - Information, 2021 - mdpi.com
This research attempts to introduce the production methodology of an anomaly detection
dataset using ten desirable requirements. Subsequently, the article presents the produced …