A survey of network-based intrusion detection data sets

M Ring, S Wunderlich, D Scheuring, D Landes… - Computers & …, 2019 - Elsevier
Labeled data sets are necessary to train and evaluate anomaly-based network intrusion
detection systems. This work provides a focused literature survey of data sets for network …

[HTML][HTML] Cybercrime threat intelligence: A systematic multi-vocal literature review

G Cascavilla, DA Tamburri, WJ Van Den Heuvel - Computers & Security, 2021 - Elsevier
Significant cybersecurity and threat intelligence analysts agree that online criminal activity is
increasing exponentially. To offer an overview of the techniques and indicators to perform …

InSDN: A novel SDN intrusion dataset

MS Elsayed, NA Le-Khac, AD Jurcut - IEEE access, 2020 - ieeexplore.ieee.org
Software-Defined Network (SDN) has been developed to reduce network complexity
through control and manage the whole network from a centralized location. Today, SDN is …

Flow-based network traffic generation using generative adversarial networks

M Ring, D Schlör, D Landes, A Hotho - Computers & Security, 2019 - Elsevier
Flow-based data sets are necessary for evaluating network-based intrusion detection
systems (NIDS). In this work, we propose a novel methodology for generating realistic flow …

A new method for flow-based network intrusion detection using the inverse Potts model

CFT Pontes, MMC De Souza… - … on Network and …, 2021 - ieeexplore.ieee.org
Network Intrusion Detection Systems (NIDS) play an important role as tools for identifying
potential network threats. In the context of ever-increasing traffic volume on computer …

On high-speed flow-based intrusion detection using snort-compatible signatures

F Erlacher, F Dressler - IEEE Transactions on Dependable and …, 2020 - ieeexplore.ieee.org
Signature-based Network Intrusion Detection Systems (NIDS) have become state-of-the-art
in modern network security solutions. However, most systems are not designed for modern …

Detecting port scan attacks using logistic regression

QA Al-Haija, E Saleh… - 2021 4th International …, 2021 - ieeexplore.ieee.org
Port scanning attack is a common cyber-attack where an attacker directs packets with
diverse port numbers to scan accessible services aiming to discover open/weak ports in a …

A novel sequence tensor recovery algorithm for quick and accurate anomaly detection

W Huang, K Xie, J Li - IEEE Transactions on Network Science …, 2022 - ieeexplore.ieee.org
Anomalous traffic detection is a vital task in advanced Internet supervision and maintenance.
To detect anomalies accurately, various data representations, such as vectors, matrices, and …

Detecting slow port scan using fuzzy rule interpolation

M Almseidin, M Al-Kasassbeh… - 2019 2nd International …, 2019 - ieeexplore.ieee.org
Fuzzy Rule Interpolation (FRI) offers a convenient way for delivering rule based decisions on
continuous universes avoiding the burden of binary decisions. In contrast with the classical …

Machine learning for netflow anomaly detection with human-readable annotations

P Krishnamurthy, F Khorrami… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We propose a framework for anomaly detection in communication network logs along with
automated extraction of human-readable annotations that explain the decision logic …