A survey on zero-day polymorphic worm detection techniques

R Kaur, M Singh - IEEE Communications Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Zero-day polymorphic worms pose a serious threat to the Internet security. With their ability
to rapidly propagate, these worms increasingly threaten the Internet hosts and services. Not …

Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation

J Song, H Takakura, Y Okabe, M Eto, D Inoue… - Proceedings of the first …, 2011 - dl.acm.org
With the rapid evolution and proliferation of botnets, large-scale cyber attacks such as
DDoS, spam emails are also becoming more and more dangerous and serious cyber …

A detailed analysis of benchmark datasets for network intrusion detection system

M Ghurab, G Gaphari, F Alshami… - Asian Journal of …, 2021 - papers.ssrn.com
The enormous increase in the use of the Internet in daily life has provided an opportunity for
the intruder attempt to compromise the security principles of availability, confidentiality, and …

Evaluation of machine learning techniques for network intrusion detection

M Zaman, CH Lung - NOMS 2018-2018 IEEE/IFIP Network …, 2018 - ieeexplore.ieee.org
Network traffic anomaly may indicate a possible intrusion in the network and therefore
anomaly detection is important to detect and prevent the security attacks. The early research …

On generating network traffic datasets with synthetic attacks for intrusion detection

CG Cordero, E Vasilomanolakis, A Wainakh… - ACM Transactions on …, 2021 - dl.acm.org
Most research in the field of network intrusion detection heavily relies on datasets. Datasets
in this field, however, are scarce and difficult to reproduce. To compare, evaluate, and test …

An ensemble-based scalable approach for intrusion detection using big data framework

SK Sahu, DP Mohapatra, JK Rout, KS Sahoo… - Big Data, 2021 - liebertpub.com
In this study, we set up a scalable framework for large-scale data processing and analytics
using the big data framework. The popular classification methods are implemented, tuned …

Toward a more practical unsupervised anomaly detection system

J Song, H Takakura, Y Okabe, K Nakao - Information Sciences, 2013 - Elsevier
During the last decade, various machine learning and data mining techniques have been
applied to Intrusion Detection Systems (IDSs) which have played an important role in …

[PDF][PDF] Description of kyoto university benchmark data

J Song, H Takakura, Y Okabe - Available at link: http://www. takakura …, 2006 - academia.edu
Our benchmark data consist of the following 24 statistical features; 14 conventional features
and 10 additional features. Among them, the first 14 features were extracted based on KDD …

Boosting positive and unlabeled learning for anomaly detection with multi-features

J Zhang, Z Wang, J Meng, YP Tan… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
One of the key challenges of machine learning-based anomaly detection relies on the
difficulty of obtaining anomaly data for training, which is usually rare, diversely distributed …

Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables

SY Ji, BK Jeong, C Kamhoua, N Leslie… - Journal of Network and …, 2022 - Elsevier
Analyzing network traffic data to detect suspicious network activities (ie, intrusions) requires
tremendous effort due to the variability of the data and constant changes in network traffic …