2022
DOI: 10.1007/978-981-16-5640-8_47
|View full text |Cite
|
Sign up to set email alerts
|

A Detailed Analysis of the CIDDS-001 and CICIDS-2017 Datasets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…The study of [36] illustrates the viability of transfer learning for intrusion detection in computationally constrained contexts utilizing raw network traffic. Our findings demonstrate this when a retrained random forest model is used in conjunction with a transferred one-dimensional convolutional neural network model [37][38][39][40].…”
Section: Literature Reviewmentioning
confidence: 55%
“…The study of [36] illustrates the viability of transfer learning for intrusion detection in computationally constrained contexts utilizing raw network traffic. Our findings demonstrate this when a retrained random forest model is used in conjunction with a transferred one-dimensional convolutional neural network model [37][38][39][40].…”
Section: Literature Reviewmentioning
confidence: 55%
“…This avoids neuron death while maintaining ReLU advantages. [8] . Table 1 shows the experimental environment.…”
Section: Network Architecture Designmentioning
confidence: 99%
“…The main work of this paper is as follows: 1) A method for converting network traffic records into two-dimensional grayscale graphs is used to extract network traffic features using image processing techniques. 2) Experimental validation was performed on the publicly available CIC-IDS-2017 dataset [8] , and the results show that the proposed Inception-LSTM neural network has higher accuracy and faster detection speed. 3) Segmentation and labeling of the captured real-time flow data using the CICFlowMeter series of tools and detection on the above model.…”
Section: Introductionmentioning
confidence: 99%
“…Based on McAfee's 2016 report, this dataset could collect common attacks, which included different types of DDoS, DoS, Infiltration, Heartbleed, and web attacks. Principally, this dataset has 2.8 million data along with 80 network traffic characteristics collected by engineering the traffic characteristics related to the intrusion detection system [ 29 ]. Class imbalance, as the most significant challenge in CICIDS dataset, has been addressed utilizing preprocess and sampling techniques.…”
Section: Literature Reviewmentioning
confidence: 99%