A survey of network-based intrusion detection data sets

M Ring, S Wunderlich, D Scheuring, D Landes… - Computers & …, 2019 - Elsevier
Labeled data sets are necessary to train and evaluate anomaly-based network intrusion
detection systems. This work provides a focused literature survey of data sets for network …

Machine learning based IoT intrusion detection system: An MQTT case study (MQTT-IoT-IDS2020 dataset)

H Hindy, E Bayne, M Bures, R Atkinson… - International networking …, 2020 - Springer
Abstract The Internet of Things (IoT) is one of the main research fields in the Cybersecurity
domain. This is due to (a) the increased dependency on automated device, and (b) the …

Flow-based benchmark data sets for intrusion detection

M Ring, S Wunderlich, D Grüdl… - Proceedings of the …, 2017 - books.google.com
Anomaly based intrusion detection systems suffer from a lack of appropriate evaluation data
sets. Often, existing data sets may not be published due to privacy concerns or do not reflect …

Creation of flow-based data sets for intrusion detection

M Ring, S Wunderlich, D Grüdl, D Landes… - Journal of Information …, 2017 - JSTOR
Publicly available labelled data sets are necessary for evaluating anomaly-based Intrusion
Detection Systems (IDSs). However, existing data sets are often not up-to-date or not yet …

Ip2vec: Learning similarities between ip addresses

M Ring, A Dallmann, D Landes… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
IP Addresses are a central part of packet-and flow-based network data. However,
visualization and similarity computation of IP Addresses are challenging to due the missing …

Detection of slow port scans in flow-based network traffic

M Ring, D Landes, A Hotho - PloS one, 2018 - journals.plos.org
Frequently, port scans are early indicators of more serious attacks. Unfortunately, the
detection of slow port scans in company networks is challenging due to the massive amount …

CUPID: A labeled dataset with Pentesting for evaluation of network intrusion detection

H Lawrence, U Ezeobi, O Tauil, J Nosal… - Journal of Systems …, 2022 - Elsevier
Reproducibility of network intrusion detection research necessitates widely available
datasets that represent real-world scenarios. One of the key omissions of existing datasets …

A Pragmatic Enquiry to Learn Recent Trends in Insider Threat Detection Approaches

G Sandra, S Silas, EB Rajsingh - 2024 7th International …, 2024 - ieeexplore.ieee.org
Insider threat has become a recurring and serious challenge faced by organization
throughout the world. It shows an increasing trend from 2003 onwards. Due to the …

Network intrusion detection system based on an adversarial auto-encoder with few labeled training samples

K Shiomoto - Journal of Network and Systems Management, 2023 - Springer
Network intrusion detection systems (NIDS) are critical to defending network systems from
cyber attacks. Recently, machine learning has been applied to enhance NIDS capability. To …

Review on insider threat detection techniques

TO Oladimeji, CK Ayo… - Journal of Physics …, 2019 - iopscience.iop.org
An insider, also regarded as an employee of a company, becomes a threat when the
intention or action can affect the company negatively. Insider threat has been an eminent …