A survey of distance and similarity measures used within network intrusion anomaly detection

DJ Weller-Fahy, BJ Borghetti… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Anomaly detection (AD) use within the network intrusion detection field of research, or
network intrusion AD (NIAD), is dependent on the proper use of similarity and distance …

Error prevalence in nids datasets: A case study on cic-ids-2017 and cse-cic-ids-2018

L Liu, G Engelen, T Lynar, D Essam… - 2022 IEEE Conference …, 2022 - ieeexplore.ieee.org
Benchmark datasets are heavily depended upon by the research community to validate
theoretical findings and track progression in the state-of-the-art. NIDS dataset creation …

A deep learning model for network intrusion detection with imbalanced data

Y Fu, Y Du, Z Cao, Q Li, W Xiang - Electronics, 2022 - mdpi.com
With an increase in the number and types of network attacks, traditional firewalls and data
encryption methods can no longer meet the needs of current network security. As a result …

BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset

T Su, H Sun, J Zhu, S Wang, Y Li - IEEE Access, 2020 - ieeexplore.ieee.org
Intrusion detection can identify unknown attacks from network traffics and has been an
effective means of network security. Nowadays, existing methods for network anomaly …

A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns

G Creech, J Hu - IEEE Transactions on Computers, 2013 - ieeexplore.ieee.org
Host-based anomaly intrusion detection system design is very challenging due to the
notoriously high false alarm rate. This paper introduces a new host-based anomaly intrusion …

Generation of a new IDS test dataset: Time to retire the KDD collection

G Creech, J Hu - 2013 IEEE wireless communications and …, 2013 - ieeexplore.ieee.org
Intrusion detection systems are generally tested using datasets compiled at the end of last
century, justified by the need for publicly available test data and the lack of any other …

A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques

G Singh, N Khare - International Journal of Computers and …, 2022 - Taylor & Francis
The evolution in the attack scenarios has been such that finding efficient and optimal
Network Intrusion Detection Systems (NIDS) with frequent updates has become a big …

A hybrid method consisting of GA and SVM for intrusion detection system

BM Aslahi-Shahri, R Rahmani, M Chizari… - Neural computing and …, 2016 - Springer
In this paper, a hybrid method of support vector machine and genetic algorithm (GA) is
proposed and its implementation in intrusion detection problem is explained. The proposed …

Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problem

SMH Bamakan, H Wang, Y Shi - Knowledge-Based Systems, 2017 - Elsevier
Network intrusion detection problem is an ongoing challenging research area because of a
huge number of traffic volumes, extremely imbalanced data sets, multi-class of attacks …

[图书][B] Systems Benchmarking

S Kounev, KD Lange, J Von Kistowski - 2020 - Springer
In January of 2010, I met Sam and Klaus at the inaugural International Conference on
Performance Engineering (ICPE), in San Jose, USA. I gave the keynote address “Software …