A survey of network-based intrusion detection data sets

M Ring, S Wunderlich, D Scheuring, D Landes… - Computers & …, 2019 - Elsevier
Labeled data sets are necessary to train and evaluate anomaly-based network intrusion
detection systems. This work provides a focused literature survey of data sets for network …

An end-to-end framework for machine learning-based network intrusion detection system

GDC Bertoli, LAP Júnior, O Saotome… - IEEE …, 2021 - ieeexplore.ieee.org
The increase of connected devices and the constantly evolving methods and techniques by
attackers pose a challenge for network intrusion detection systems from conception to …

Robust anomaly detection and regularized domain adaptation of classifiers with application to internet packet-flows

DJ Miller, G Kesidis, J Raghuram - US Patent 9,038,172, 2015 - Google Patents
Sound, robust methods identify the most suitable, parsimonious set of tests to use with
respect to prioritized, sequential anomaly detection in a collected batch of sample data …

Prudent practices for designing malware experiments: Status quo and outlook

C Rossow, CJ Dietrich, C Grier… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
Malware researchers rely on the observation of malicious code in execution to collect
datasets for a wide array of experiments, including generation of detection models, study of …

Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification

F Haddadi, AN Zincir-Heywood - IEEE Systems journal, 2014 - ieeexplore.ieee.org
Botnets represent one of the most aggressive threats against cyber security. Different
techniques using different feature sets have been proposed for botnet traffic analysis and …

Malware traffic detection using tamper resistant features

ZB Celik, RJ Walls, P McDaniel… - MILCOM 2015-2015 …, 2015 - ieeexplore.ieee.org
This paper presents a framework for evaluating the transport layer feature space of malware
heartbeat traffic. We utilize these features in a prototype detection system to distinguish …

[PDF][PDF] Network intrusion detection: Half a kingdom for a good dataset

M Małowidzki, P Berezinski, M Mazur - Proceedings of NATO STO …, 2015 - academia.edu
Researchers working on anomaly-based network intrusion detection immediately face a first,
somewhat surprising problem: The lack of good, recent datasets that could be employed for …

A new attack composition for network security

F Beer, T Hofer, D Karimi, U Bühler - 2017 - dl.gi.de
As the current cyber threat landscape is becoming more depressing, sophisticated intrusion
detection systems must evolve to protect network infrastructures efficiently. Building such a …

On the effectiveness of different botnet detection approaches

F Haddadi, D Le Cong, L Porter… - … Security Practice and …, 2015 - Springer
Botnets represent one of the most significant threats against cyber security. They employ
different techniques, topologies and communication protocols in different stages of their …

On botnet behaviour analysis using GP and C4. 5

F Haddadi, D Runkel, AN Zincir-Heywood… - Proceedings of the …, 2014 - dl.acm.org
Botnets represent a destructive cyber security threat that aim to hide their malicious activities
within legitimate Internet traffic. Part of what makes botnets so affective is that they often …