Intrusion detection in network systems through hybrid supervised and unsupervised machine learning process: A case study on the iscx dataset

S Soheily-Khah, PF Marteau… - 2018 1st International …, 2018 - ieeexplore.ieee.org
Data mining techniques play an increasing role in the intrusion detection by analyzing
network data and classifying it as' normal'or'intrusion'. In recent years, several data mining …

A survey of network traffic anonymisation techniques and implementations

NV Dijkhuizen, JVD Ham - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Many networking research activities are dependent on the availability of network captures.
Even outside academic research, there is a need for sharing network captures to cooperate …

Mitigating False Negative intruder decisions in WSN-based Smart Grid monitoring

S Otoum, B Kantarci, HT Mouftah - 2017 13th International …, 2017 - ieeexplore.ieee.org
Monitoring the Smart Grid (SG) is highly desired for critical applications such as power
quality assessment and transformer monitoring. Due to their low-cost, flexibility and …

Hybrid isolation forest-application to intrusion detection

PF Marteau, S Soheily-Khah, N Béchet - arXiv preprint arXiv:1705.03800, 2017 - arxiv.org
From the identification of a drawback in the Isolation Forest (IF) algorithm that limits its use in
the scope of anomaly detection, we propose two extensions that allow to firstly overcome the …

Design of multilevel hybrid classifier with variant feature sets for intrusion detection system

M HACIBEYOĞLU, B KARLIK - IEICE TRANSACTIONS on …, 2016 - search.ieice.org
With the increase of network components connected to the Internet, the need to ensure
secure connectivity is becoming increasingly vital. Intrusion Detection Systems (IDSs) are …

A study of usability-aware network trace anonymization

K Mivule, B Anderson - 2015 Science and Information …, 2015 - ieeexplore.ieee.org
The publication and sharing of network trace data is a critical to the advancement of
collaborative research among various entities, both in government, private sector, and …

Hybridization of mean shift clustering and deep packet inspected classification for network traffic analysis

SAP Kumar, A Suresh, SR Anand… - Wireless Personal …, 2022 - Springer
Network traffic processing is an automated method for arranging and optimizing network
traffic, based on the parameters. The traffic data is gathered to begin the study of the …

A Self-adaptive and Secure Approach to Share Network Trace Data

A Xenakis, SM Nourin, Z Chen, G Karabatis… - … Threats: Research and …, 2023 - dl.acm.org
A large volume of network trace data are collected by the government and public and private
organizations and can be analyzed for various purposes such as resolving network …

Intrusion detection in network systems through hybrid supervised and unsupervised mining process-a detailed case study on the ISCX benchmark dataset

S Soheily-Khah, PF Marteau, N Béchet - 2017 - hal.science
Data mining techniques play an increasing role in the intrusion detection by analyzing
network data and classifying it as' normal'or'intrusion'. In recent years, several data mining …

Application and preliminary evaluation of Anontool applied in the anomaly detection module

P Bienias, A Warzyński… - 2020 IEEE 29th …, 2020 - ieeexplore.ieee.org
The goal of the work is to present a preliminary result of research about trade-off between
privacy and utility in network traces. The study is considered in context of anomaly detection …