[HTML][HTML] A systematic literature review of methods and datasets for anomaly-based network intrusion detection
As network techniques rapidly evolve, attacks are becoming increasingly sophisticated and
threatening. Network intrusion detection has been widely accepted as an effective method to …
threatening. Network intrusion detection has been widely accepted as an effective method to …
A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions
With the increase in the usage of the Internet, a large amount of information is exchanged
between different communicating devices. The data should be communicated securely …
between different communicating devices. The data should be communicated securely …
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
In this paper, we present a survey of deep learning approaches for cyber security intrusion
detection, the datasets used, and a comparative study. Specifically, we provide a review of …
detection, the datasets used, and a comparative study. Specifically, we provide a review of …
A survey of network-based intrusion detection data sets
Labeled data sets are necessary to train and evaluate anomaly-based network intrusion
detection systems. This work provides a focused literature survey of data sets for network …
detection systems. This work provides a focused literature survey of data sets for network …
[PDF][PDF] Toward generating a new intrusion detection dataset and intrusion traffic characterization.
With exponential growth in the size of computer networks and developed applications, the
significant increasing of the potential damage that can be caused by launching attacks is …
significant increasing of the potential damage that can be caused by launching attacks is …
A scheme for generating a dataset for anomalous activity detection in iot networks
I Ullah, QH Mahmoud - Canadian conference on artificial intelligence, 2020 - Springer
The exponential growth of the Internet of Things (IoT) devices provides a large attack surface
for intruders to launch more destructive cyber-attacks. The intruder aimed to exhaust the …
for intruders to launch more destructive cyber-attacks. The intruder aimed to exhaust the …
A survey of random forest based methods for intrusion detection systems
PAA Resende, AC Drummond - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Over the past decades, researchers have been proposing different Intrusion Detection
approaches to deal with the increasing number and complexity of threats for computer …
approaches to deal with the increasing number and complexity of threats for computer …
An empirical comparison of botnet detection methods
The results of botnet detection methods are usually presented without any comparison.
Although it is generally accepted that more comparisons with third-party methods may help …
Although it is generally accepted that more comparisons with third-party methods may help …
Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges
G Kocher, G Kumar - Soft Computing, 2021 - Springer
Deep learning (DL) is gaining significant prevalence in every field of study due to its
domination in training large data sets. However, several applications are utilizing machine …
domination in training large data sets. However, several applications are utilizing machine …
[PDF][PDF] Towards a reliable intrusion detection benchmark dataset
The urgently growing number of security threats on Internet and intranet networks highly
demands reliable security solutions. Among various options, Intrusion Detection (IDSs) and …
demands reliable security solutions. Among various options, Intrusion Detection (IDSs) and …