A survey of network-based intrusion detection data sets

M Ring, S Wunderlich, D Scheuring, D Landes… - Computers & …, 2019 - Elsevier
Labeled data sets are necessary to train and evaluate anomaly-based network intrusion
detection systems. This work provides a focused literature survey of data sets for network …

Flow monitoring explained: From packet capture to data analysis with netflow and ipfix

R Hofstede, P Čeleda, B Trammell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Flow monitoring has become a prevalent method for monitoring traffic in high-speed
networks. By focusing on the analysis of flows, rather than individual packets, it is often said …

A survey of methods for encrypted traffic classification and analysis

P Velan, M Čermák, P Čeleda… - International Journal of …, 2015 - Wiley Online Library
With the widespread use of encrypted data transport, network traffic encryption is becoming
a standard nowadays. This presents a challenge for traffic measurement, especially for …

Flow-based intrusion detection: Techniques and challenges

MF Umer, M Sher, Y Bi - Computers & Security, 2017 - Elsevier
Flow-based intrusion detection is an innovative way of detecting intrusions in high-speed
networks. Flow-based intrusion detection only inspects the packet header and does not …

Inter-dataset generalization strength of supervised machine learning methods for intrusion detection

L D'hooge, T Wauters, B Volckaert… - Journal of Information …, 2020 - Elsevier
This article describes an experimental investigation into the inter-dataset generalization of
supervised machine learning methods, trained to distinguish between benign and several …

NEMEA: a framework for network traffic analysis

T Cejka, V Bartos, M Svepes, Z Rosa… - … on Network and …, 2016 - ieeexplore.ieee.org
Since network attacks become more sophisticated, it is difficult to discover them using
traditional analysis tools. For some kinds of attacks, it is necessary to analyze Application …

Ssh and ftp brute-force attacks detection in computer networks: Lstm and machine learning approaches

MD Hossain, H Ochiai, F Doudou… - 2020 5th international …, 2020 - ieeexplore.ieee.org
Network traffic anomaly detection is of critical importance in cybersecurity due to the massive
and rapid growth of sophisticated computer network attacks. Indeed, the more new Internet …

SSH compromise detection using NetFlow/IPFIX

R Hofstede, L Hendriks, A Sperotto, A Pras - ACM SIGCOMM computer …, 2014 - dl.acm.org
Flow-based approaches for SSH intrusion detection have been developed to overcome the
scalability issues of host-based alternatives. Although the detection of many SSH attacks in …

An ai-powered network threat detection system

BX Wang, JL Chen, CL Yu - IEEE Access, 2022 - ieeexplore.ieee.org
The work develops a network threat detection system, AI@ NTDS, that uses the behavioral
features of attackers and intelligent techniques. The proposed AI@ NTDS system combines …

[PDF][PDF] Anomaly detection in networks using machine learning

K Kostas - Research Proposal, 2018 - researchgate.net
Every day millions of people and hundreds of thousands of institutions communicate with
each other over the Internet. In the past two decades, while the number of people using the …