Bad design smells in benchmark nids datasets

R Flood, G Engelen, D Aspinall… - 2024 IEEE 9th European …, 2024 - ieeexplore.ieee.org
Synthetically generated benchmark datasets are vitally important for machine learning and
network intrusion research. When producing intrusion datasets for research, providers make …

[HTML][HTML] A sequential deep learning framework for a robust and resilient network intrusion detection system

S Hore, J Ghadermazi, A Shah, ND Bastian - Computers & Security, 2024 - Elsevier
Ensuring the security and integrity of computer and network systems is of utmost importance
in today's digital landscape. Network intrusion detection systems (NIDS) play a critical role in …

Interpreting unsupervised anomaly detection in security via rule extraction

R Li, Q Li, Y Zhang, D Zhao… - Advances in Neural …, 2024 - proceedings.neurips.cc
Many security applications require unsupervised anomaly detection, as malicious data are
extremely rare and often only unlabeled normal data are available for training (ie, zero …

Evaluating The Explainability of State-of-the-Art Machine Learning-based Online Network Intrusion Detection Systems

A Kumar, VLL Thing - arXiv preprint arXiv:2408.14040, 2024 - arxiv.org
Network Intrusion Detection Systems (NIDSs) which use machine learning (ML) models
achieve high detection performance and accuracy while avoiding dependence on fixed …

Themis: A passive-active hybrid framework with in-network intelligence for lightweight failure localization

J Xiao, Q Li, D Zhao, X Zuo, W Tang, Y Jiang - Computer Networks, 2024 - Elsevier
The fast and efficient failure detection and localization is essential for stable network
transmission. Unfortunately, existing schemes suffer from a few drawbacks such as …

iGuard: Efficient Isolation Forest Design for Malicious Traffic Detection in Programmable Switches

S Mittal, HV, P Heetkumar, P Tammana - Proceedings of the 20th …, 2024 - dl.acm.org
Deploying machine learning (ML) models in programmable switch data planes facilitates
low latency and high throughput traffic inference at line speed. However, data planes pose …

VIFL: vulnerability identification using federated learning in the internet of things systems

W Issa, N Moustafa, B Turnbull, N Sohrabi, Z Tari… - Computing, 2025 - Springer
Vulnerability identification has been broadly studied as a way to improve cybersecurity.
Internet of Things (IoT) ecosystems are considered particularly vulnerable as a whole, due to …

On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home Devices

S Sunar, P Shirani, S Majumdar, JD Brown - Proceedings of the 17th …, 2024 - dl.acm.org
The correct functionality (can also be called as functional integrity) from a smart device is
essential towards ensuring their safe and secure operations. The functional integrity of a …

Genos: General In-Network Unsupervised Intrusion Detection by Rule Extraction

R Li, Q Li, Y Zhang, D Zhao, X Xiao, Y Jiang - arXiv preprint arXiv …, 2024 - arxiv.org
Anomaly-based network intrusion detection systems (A-NIDS) use unsupervised models to
detect unforeseen attacks. However, existing A-NIDS solutions suffer from low throughput …

Seqnature: Extracting Network Fingerprints from Packet Sequences

J Varmarken, R Trimananda, A Markopoulou - arXiv preprint arXiv …, 2023 - arxiv.org
This paper proposes a general network fingerprinting framework, Seqnature, that uses
packet sequences as its basic data unit and that makes it simple to implement any …