A survey on zero-day polymorphic worm detection techniques
Zero-day polymorphic worms pose a serious threat to the Internet security. With their ability
to rapidly propagate, these worms increasingly threaten the Internet hosts and services. Not …
to rapidly propagate, these worms increasingly threaten the Internet hosts and services. Not …
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation
With the rapid evolution and proliferation of botnets, large-scale cyber attacks such as
DDoS, spam emails are also becoming more and more dangerous and serious cyber …
DDoS, spam emails are also becoming more and more dangerous and serious cyber …
A detailed analysis of benchmark datasets for network intrusion detection system
The enormous increase in the use of the Internet in daily life has provided an opportunity for
the intruder attempt to compromise the security principles of availability, confidentiality, and …
the intruder attempt to compromise the security principles of availability, confidentiality, and …
Evaluation of machine learning techniques for network intrusion detection
M Zaman, CH Lung - NOMS 2018-2018 IEEE/IFIP Network …, 2018 - ieeexplore.ieee.org
Network traffic anomaly may indicate a possible intrusion in the network and therefore
anomaly detection is important to detect and prevent the security attacks. The early research …
anomaly detection is important to detect and prevent the security attacks. The early research …
On generating network traffic datasets with synthetic attacks for intrusion detection
Most research in the field of network intrusion detection heavily relies on datasets. Datasets
in this field, however, are scarce and difficult to reproduce. To compare, evaluate, and test …
in this field, however, are scarce and difficult to reproduce. To compare, evaluate, and test …
An ensemble-based scalable approach for intrusion detection using big data framework
In this study, we set up a scalable framework for large-scale data processing and analytics
using the big data framework. The popular classification methods are implemented, tuned …
using the big data framework. The popular classification methods are implemented, tuned …
Toward a more practical unsupervised anomaly detection system
During the last decade, various machine learning and data mining techniques have been
applied to Intrusion Detection Systems (IDSs) which have played an important role in …
applied to Intrusion Detection Systems (IDSs) which have played an important role in …
[PDF][PDF] Description of kyoto university benchmark data
Our benchmark data consist of the following 24 statistical features; 14 conventional features
and 10 additional features. Among them, the first 14 features were extracted based on KDD …
and 10 additional features. Among them, the first 14 features were extracted based on KDD …
Boosting positive and unlabeled learning for anomaly detection with multi-features
One of the key challenges of machine learning-based anomaly detection relies on the
difficulty of obtaining anomaly data for training, which is usually rare, diversely distributed …
difficulty of obtaining anomaly data for training, which is usually rare, diversely distributed …
Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables
Analyzing network traffic data to detect suspicious network activities (ie, intrusions) requires
tremendous effort due to the variability of the data and constant changes in network traffic …
tremendous effort due to the variability of the data and constant changes in network traffic …