A survey of network-based intrusion detection data sets

M Ring, S Wunderlich, D Scheuring, D Landes… - Computers & …, 2019 - Elsevier
Labeled data sets are necessary to train and evaluate anomaly-based network intrusion
detection systems. This work provides a focused literature survey of data sets for network …

A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems

D Gümüşbaş, T Yıldırım, A Genovese… - IEEE Systems …, 2020 - ieeexplore.ieee.org
This survey presents a comprehensive overview of machine learning methods for
cybersecurity intrusion detection systems, with a specific focus on recent approaches based …

Outside the closed world: On using machine learning for network intrusion detection

R Sommer, V Paxson - 2010 IEEE symposium on security and …, 2010 - ieeexplore.ieee.org
In network intrusion detection research, one popular strategy for finding attacks is monitoring
a network's activity for anomalies: deviations from profiles of normality previously learned …

Broken promises of privacy: Responding to the surprising failure of anonymization

P Ohm - UCLA l. Rev., 2009 - HeinOnline
Imagine a database packed with sensitive information about many people. Perhaps this
database helps a hospital track its patients, a school its students, or a bank its customers …

SANE: A Protection Architecture for Enterprise Networks.

M Casado, T Garfinkel, A Akella, MJ Freedman… - USENIX security …, 2006 - usenix.org
Connectivity in today's enterprise networks is regulated by a combination of complex routing
and bridging policies, along with various interdiction mechanisms such as ACLs, packet …

A practical attack to de-anonymize social network users

G Wondracek, T Holz, E Kirda… - 2010 ieee symposium …, 2010 - ieeexplore.ieee.org
Social networking sites such as Facebook, LinkedIn, and **ng have been reporting
exponential growth rates and have millions of registered users. In this paper, we introduce a …

A survey of public IoT datasets for network security research

F De Keersmaeker, Y Cao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Publicly available datasets are an indispensable tool for researchers, as they allow testing
new algorithms on a wide range of different scenarios and making scientific experiments …

[PDF][PDF] Anonymizing social networks

M Hay, G Miklau, D Jensen, P Weis… - Computer science …, 2007 - scholarworks.umass.edu
Advances in technology have made it possible to collect data about individuals and the
connections between them, such as email correspondence and friendships. Agencies and …

Support vector machines for TCP traffic classification

A Este, F Gringoli, L Salgarelli - Computer Networks, 2009 - Elsevier
Support Vector Machines (SVM) represent one of the most promising Machine Learning
(ML) tools that can be applied to the problem of traffic classification in IP networks. In the …

Embark: Securely outsourcing middleboxes to the cloud

C Lan, J Sherry, RA Popa, S Ratnasamy… - 13th USENIX Symposium …, 2016 - usenix.org
It is increasingly common for enterprises and other organizations to outsource network
processing to the cloud. For example, enterprises may outsource firewalling, caching, and …