A survey of network-based intrusion detection data sets
Labeled data sets are necessary to train and evaluate anomaly-based network intrusion
detection systems. This work provides a focused literature survey of data sets for network …
detection systems. This work provides a focused literature survey of data sets for network …
An end-to-end framework for machine learning-based network intrusion detection system
The increase of connected devices and the constantly evolving methods and techniques by
attackers pose a challenge for network intrusion detection systems from conception to …
attackers pose a challenge for network intrusion detection systems from conception to …
Robust anomaly detection and regularized domain adaptation of classifiers with application to internet packet-flows
Sound, robust methods identify the most suitable, parsimonious set of tests to use with
respect to prioritized, sequential anomaly detection in a collected batch of sample data …
respect to prioritized, sequential anomaly detection in a collected batch of sample data …
Prudent practices for designing malware experiments: Status quo and outlook
Malware researchers rely on the observation of malicious code in execution to collect
datasets for a wide array of experiments, including generation of detection models, study of …
datasets for a wide array of experiments, including generation of detection models, study of …
Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification
F Haddadi, AN Zincir-Heywood - IEEE Systems journal, 2014 - ieeexplore.ieee.org
Botnets represent one of the most aggressive threats against cyber security. Different
techniques using different feature sets have been proposed for botnet traffic analysis and …
techniques using different feature sets have been proposed for botnet traffic analysis and …
Malware traffic detection using tamper resistant features
This paper presents a framework for evaluating the transport layer feature space of malware
heartbeat traffic. We utilize these features in a prototype detection system to distinguish …
heartbeat traffic. We utilize these features in a prototype detection system to distinguish …
[PDF][PDF] Network intrusion detection: Half a kingdom for a good dataset
M Małowidzki, P Berezinski, M Mazur - Proceedings of NATO STO …, 2015 - academia.edu
Researchers working on anomaly-based network intrusion detection immediately face a first,
somewhat surprising problem: The lack of good, recent datasets that could be employed for …
somewhat surprising problem: The lack of good, recent datasets that could be employed for …
A new attack composition for network security
F Beer, T Hofer, D Karimi, U Bühler - 2017 - dl.gi.de
As the current cyber threat landscape is becoming more depressing, sophisticated intrusion
detection systems must evolve to protect network infrastructures efficiently. Building such a …
detection systems must evolve to protect network infrastructures efficiently. Building such a …
On the effectiveness of different botnet detection approaches
Botnets represent one of the most significant threats against cyber security. They employ
different techniques, topologies and communication protocols in different stages of their …
different techniques, topologies and communication protocols in different stages of their …
On botnet behaviour analysis using GP and C4. 5
F Haddadi, D Runkel, AN Zincir-Heywood… - Proceedings of the …, 2014 - dl.acm.org
Botnets represent a destructive cyber security threat that aim to hide their malicious activities
within legitimate Internet traffic. Part of what makes botnets so affective is that they often …
within legitimate Internet traffic. Part of what makes botnets so affective is that they often …