Toward developing a systematic approach to generate benchmark datasets for intrusion detection

A Shiravi, H Shiravi, M Tavallaee, AA Ghorbani - computers & security, 2012 - Elsevier
In network intrusion detection, anomaly-based approaches in particular suffer from accurate
evaluation, comparison, and deployment which originates from the scarcity of adequate …

Toward a reliable anomaly-based intrusion detection in real-world environments

EK Viegas, AO Santin, LS Oliveira - Computer Networks, 2017 - Elsevier
A popular approach for detecting network intrusion attempts is to monitor the network traffic
for anomalies. Extensive research effort has been invested in anomaly-based network …

[HTML][HTML] A systematic literature review of methods and datasets for anomaly-based network intrusion detection

Z Yang, X Liu, T Li, D Wu, J Wang, Y Zhao, H Han - Computers & Security, 2022 - Elsevier
As network techniques rapidly evolve, attacks are becoming increasingly sophisticated and
threatening. Network intrusion detection has been widely accepted as an effective method to …

[PDF][PDF] Toward generating a new intrusion detection dataset and intrusion traffic characterization.

I Sharafaldin, AH Lashkari, AA Ghorbani - ICISSp, 2018 - scitepress.org
With exponential growth in the size of computer networks and developed applications, the
significant increasing of the potential damage that can be caused by launching attacks is …

A survey of network-based intrusion detection data sets

M Ring, S Wunderlich, D Scheuring, D Landes… - Computers & …, 2019 - Elsevier
Labeled data sets are necessary to train and evaluate anomaly-based network intrusion
detection systems. This work provides a focused literature survey of data sets for network …

[PDF][PDF] Towards Generating Real-life Datasets for Network Intrusion Detection.

MH Bhuyan, DK Bhattacharyya, JK Kalita - Int. J. Netw. Secur., 2015 - ijns.jalaxy.com.tw
With exponential growth in the number of computer applications and the sizes of networks,
the potential damage that can be caused by attacks launched over the Internet keeps …

Are public intrusion datasets fit for purpose characterising the state of the art in intrusion event datasets

A Kenyon, L Deka, D Elizondo - Computers & Security, 2020 - Elsevier
In recent years cybersecurity attacks have caused major disruption and information loss for
online organisations, with high profile incidents in the news. One of the key challenges in …

Data preprocessing for anomaly based network intrusion detection: A review

JJ Davis, AJ Clark - computers & security, 2011 - Elsevier
Data preprocessing is widely recognized as an important stage in anomaly detection. This
paper reviews the data preprocessing techniques used by anomaly-based network intrusion …

Data mining techniques in intrusion detection systems: A systematic literature review

F Salo, M Injadat, AB Nassif, A Shami, A Essex - IEEE Access, 2018 - ieeexplore.ieee.org
The continued ability to detect malicious network intrusions has become an exercise in
scalability, in which data mining techniques are playing an increasingly important role. We …

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

S Hajj, R El Sibai, J Bou Abdo… - Transactions on …, 2021 - Wiley Online Library
With the Internet's unprecedented growth and nations' reliance on computer networks, new
cyber‐attacks are created every day as means for achieving financial gain, imposing …