Flow-based network traffic generation using generative adversarial networks

M Ring, D Schlör, D Landes, A Hotho - Computers & Security, 2019 - Elsevier
Flow-based data sets are necessary for evaluating network-based intrusion detection
systems (NIDS). In this work, we propose a novel methodology for generating realistic flow …

Combining network anomaly detectors

M Grill - 2016 - search.proquest.com
The anomaly-based network intrusion detection systems (IDS) typically suffer from high false
alarm rate rendering them useless in practice as the subsequent analysis done by the …

Dynamic reconfiguration of intrusion detection systems

J Stiborek - 2017 - search.proquest.com
Intrusion detection systems (IDS) used in network security are complex solutions that require
precise tuning prior to their deployment. Such tuning, however, is a problem. If done …