2021
DOI: 10.1080/1206212x.2021.1885150
|View full text |Cite
|
Sign up to set email alerts
|

A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 54 publications
(22 citation statements)
references
References 47 publications
0
12
0
Order By: Relevance
“…In this section we reports a brief description about the dataset on which the proposed method is applied. The choice of the selected datasets derive from a preliminary study of the state of the art on IDS issues, reveling that KDD99, UNSW-NB15 and CSE-CIC-IDS are the most important benchmarks for evaluating new algorithms [21]- [29]. We also propose to apply the innovative proposed methodology to a novel dataset generated and released in 2022, representative of IIoT applications.…”
Section: A Brief Description Of the Selected Datasetsmentioning
confidence: 99%
“…In this section we reports a brief description about the dataset on which the proposed method is applied. The choice of the selected datasets derive from a preliminary study of the state of the art on IDS issues, reveling that KDD99, UNSW-NB15 and CSE-CIC-IDS are the most important benchmarks for evaluating new algorithms [21]- [29]. We also propose to apply the innovative proposed methodology to a novel dataset generated and released in 2022, representative of IIoT applications.…”
Section: A Brief Description Of the Selected Datasetsmentioning
confidence: 99%
“…Particularly, IDS still the most effective mechanism to detect and analyze suspicious activities that occur in WSNs [2,9]. An IDS automates the detection of intrusion activities that can compromise the confidentiality, availability, and integrity of WSN through bypassing the security mechanisms [15,18]. IDS agent performs an important task for securing network from intrusive attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Particularly, IDS still the most effective mechanism to detect and analyze suspicious activities that occur in WSNs [2,9]. An IDS automates the detection of intrusion activities that can compromise the confidentiality, availability, and integrity of WSN through bypassing the security mechanisms [15,18]. IDS agent performs an important task for securing network from intrusive attacks.…”
Section: Introductionmentioning
confidence: 99%