[HTML][HTML] A systematic literature review of methods and datasets for anomaly-based network intrusion detection

Z Yang, X Liu, T Li, D Wu, J Wang, Y Zhao, H Han - Computers & Security, 2022 - Elsevier
As network techniques rapidly evolve, attacks are becoming increasingly sophisticated and
threatening. Network intrusion detection has been widely accepted as an effective method to …

A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions

A Thakkar, R Lohiya - Artificial Intelligence Review, 2022 - Springer
With the increase in the usage of the Internet, a large amount of information is exchanged
between different communicating devices. The data should be communicated securely …

Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study

MA Ferrag, L Maglaras, S Moschoyiannis… - Journal of Information …, 2020 - Elsevier
In this paper, we present a survey of deep learning approaches for cyber security intrusion
detection, the datasets used, and a comparative study. Specifically, we provide a review of …

A survey of network-based intrusion detection data sets

M Ring, S Wunderlich, D Scheuring, D Landes… - Computers & …, 2019 - Elsevier
Labeled data sets are necessary to train and evaluate anomaly-based network intrusion
detection systems. This work provides a focused literature survey of data sets for network …

[PDF][PDF] Toward generating a new intrusion detection dataset and intrusion traffic characterization.

I Sharafaldin, AH Lashkari, AA Ghorbani - ICISSp, 2018 - scitepress.org
With exponential growth in the size of computer networks and developed applications, the
significant increasing of the potential damage that can be caused by launching attacks is …

A scheme for generating a dataset for anomalous activity detection in iot networks

I Ullah, QH Mahmoud - Canadian conference on artificial intelligence, 2020 - Springer
The exponential growth of the Internet of Things (IoT) devices provides a large attack surface
for intruders to launch more destructive cyber-attacks. The intruder aimed to exhaust the …

A survey of random forest based methods for intrusion detection systems

PAA Resende, AC Drummond - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Over the past decades, researchers have been proposing different Intrusion Detection
approaches to deal with the increasing number and complexity of threats for computer …

An empirical comparison of botnet detection methods

S Garcia, M Grill, J Stiborek, A Zunino - computers & security, 2014 - Elsevier
The results of botnet detection methods are usually presented without any comparison.
Although it is generally accepted that more comparisons with third-party methods may help …

Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges

G Kocher, G Kumar - Soft Computing, 2021 - Springer
Deep learning (DL) is gaining significant prevalence in every field of study due to its
domination in training large data sets. However, several applications are utilizing machine …

[PDF][PDF] Towards a reliable intrusion detection benchmark dataset

I Sharafaldin, A Gharib, AH Lashkari… - Software …, 2018 - researchgate.net
The urgently growing number of security threats on Internet and intranet networks highly
demands reliable security solutions. Among various options, Intrusion Detection (IDSs) and …