2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications 2009
DOI: 10.1109/cisda.2009.5356528
|View full text |Cite
|
Sign up to set email alerts
|

A detailed analysis of the KDD CUP 99 data set

Abstract: Abstract-During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks, and KDDCUP'99 is the mostly widely used data set for the evaluation of these systems. Having conducted an statistical analysis on this data set, we found two important issues which highly affects the performance of evaluated systems, and results in a very poor evaluation of anomaly detection approaches. To solve these issues, we have pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

4
1,905
0
34

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 3,426 publications
(1,943 citation statements)
references
References 13 publications
4
1,905
0
34
Order By: Relevance
“…Although the dataset is not without criticism [20], it is the only public dataset with labeled attack samples. Moreover, many research works have been evaluated using this dataset as well.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…Although the dataset is not without criticism [20], it is the only public dataset with labeled attack samples. Moreover, many research works have been evaluated using this dataset as well.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…To supplement a real but undisclosed log data set, we used the popular KDD Cup 99 data (Bache and Lichman, 2013). The data set does have many problems and limitations, e.g., the data is completely artificial and synthetic and might not represent real network traffic, and there are many redundant records which is problematic for machine learning algorithms (Tavallaee et al, 2009). On the other hand, the data set is widely used and is useful for comparisons.…”
Section: New Unpublished Resultsmentioning
confidence: 99%
“…Although we know that there are a couple of discussions about using KDD99 data as evaluation data [9], for now it is the only candidate for using network intrusion evaluation data.…”
Section: B Evaluation Datamentioning
confidence: 99%