2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) 2018
DOI: 10.1109/nca.2018.8548316
|View full text |Cite
|
Sign up to set email alerts
|

A Practical Application of a Dataset Analysis in an Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…There is some research on Early Warning Systems (EWS), especially to avoid malware propagation, that explore different alternatives such as bayesian inference [16], Kalman filter [17] or sensors [18], but the evaluation is mainly focused on the identification of potential attacks in a timeline, without presenting a proper time-aware performance metric. More closely related to this work, [19] explores different methods for the early detection of cyber attacks using ERDE as the main performance metrics, while on [20] the authors focus on Operating System scan attacks and include F 1 − latency as time-aware evaluation metric.…”
Section: Related Workmentioning
confidence: 99%
“…There is some research on Early Warning Systems (EWS), especially to avoid malware propagation, that explore different alternatives such as bayesian inference [16], Kalman filter [17] or sensors [18], but the evaluation is mainly focused on the identification of potential attacks in a timeline, without presenting a proper time-aware performance metric. More closely related to this work, [19] explores different methods for the early detection of cyber attacks using ERDE as the main performance metrics, while on [20] the authors focus on Operating System scan attacks and include F 1 − latency as time-aware evaluation metric.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, some works present the feature extraction for applications in machine learning [18,30,32]. The N-baIoT detects botnet attacks extracting behavior snapshots of the network, and using deep autoencoders [33].…”
Section: Dataset Feature Analysismentioning
confidence: 99%
“…DAD allows the evaluation of anomaly detection algorithms. A set of features was selected among the most used features in this kind of domain [30,32,45]. These features can be used for the application of different machine learning techniques.…”
Section: Monday Tuesdaymentioning
confidence: 99%
“…MQTT protocol is an application layer protocol, so it is on top of TCP/IP heap. Therefore, both the client and the broker need to have a TCP/IP stack and the analysis must be done taking this into account [6].…”
Section: Dataset Analysismentioning
confidence: 99%
“…[7]. The results can be evaluated using different metrics: the traditional precision, recall and F1, and Early Risk Detection Error (ERDE) [6].…”
Section: Identification Of Machine Learning Algorithms and Optimizatimentioning
confidence: 99%