Bad design smells in benchmark nids datasets
R Flood, G Engelen, D Aspinall… - 2024 IEEE 9th European …, 2024 - ieeexplore.ieee.org
Synthetically generated benchmark datasets are vitally important for machine learning and
network intrusion research. When producing intrusion datasets for research, providers make …
network intrusion research. When producing intrusion datasets for research, providers make …
[HTML][HTML] A sequential deep learning framework for a robust and resilient network intrusion detection system
Ensuring the security and integrity of computer and network systems is of utmost importance
in today's digital landscape. Network intrusion detection systems (NIDS) play a critical role in …
in today's digital landscape. Network intrusion detection systems (NIDS) play a critical role in …
Interpreting unsupervised anomaly detection in security via rule extraction
Many security applications require unsupervised anomaly detection, as malicious data are
extremely rare and often only unlabeled normal data are available for training (ie, zero …
extremely rare and often only unlabeled normal data are available for training (ie, zero …
Evaluating The Explainability of State-of-the-Art Machine Learning-based Online Network Intrusion Detection Systems
A Kumar, VLL Thing - arXiv preprint arXiv:2408.14040, 2024 - arxiv.org
Network Intrusion Detection Systems (NIDSs) which use machine learning (ML) models
achieve high detection performance and accuracy while avoiding dependence on fixed …
achieve high detection performance and accuracy while avoiding dependence on fixed …
Themis: A passive-active hybrid framework with in-network intelligence for lightweight failure localization
The fast and efficient failure detection and localization is essential for stable network
transmission. Unfortunately, existing schemes suffer from a few drawbacks such as …
transmission. Unfortunately, existing schemes suffer from a few drawbacks such as …
iGuard: Efficient Isolation Forest Design for Malicious Traffic Detection in Programmable Switches
S Mittal, HV, P Heetkumar, P Tammana - Proceedings of the 20th …, 2024 - dl.acm.org
Deploying machine learning (ML) models in programmable switch data planes facilitates
low latency and high throughput traffic inference at line speed. However, data planes pose …
low latency and high throughput traffic inference at line speed. However, data planes pose …
VIFL: vulnerability identification using federated learning in the internet of things systems
Vulnerability identification has been broadly studied as a way to improve cybersecurity.
Internet of Things (IoT) ecosystems are considered particularly vulnerable as a whole, due to …
Internet of Things (IoT) ecosystems are considered particularly vulnerable as a whole, due to …
On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home Devices
S Sunar, P Shirani, S Majumdar, JD Brown - Proceedings of the 17th …, 2024 - dl.acm.org
The correct functionality (can also be called as functional integrity) from a smart device is
essential towards ensuring their safe and secure operations. The functional integrity of a …
essential towards ensuring their safe and secure operations. The functional integrity of a …
Genos: General In-Network Unsupervised Intrusion Detection by Rule Extraction
Anomaly-based network intrusion detection systems (A-NIDS) use unsupervised models to
detect unforeseen attacks. However, existing A-NIDS solutions suffer from low throughput …
detect unforeseen attacks. However, existing A-NIDS solutions suffer from low throughput …
Seqnature: Extracting Network Fingerprints from Packet Sequences
This paper proposes a general network fingerprinting framework, Seqnature, that uses
packet sequences as its basic data unit and that makes it simple to implement any …
packet sequences as its basic data unit and that makes it simple to implement any …