2020
DOI: 10.1109/access.2020.3000179
|View full text |Cite
|
Sign up to set email alerts
|

A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems

Abstract: As the world moves towards being increasingly dependent on computers and automation, building secure applications, systems and networks are some of the main challenges faced in the current decade. The number of threats that individuals and businesses face is rising exponentially due to the increasing complexity of networks and services of modern networks. To alleviate the impact of these threats, researchers have proposed numerous solutions for anomaly detection; however, current tools often fail to adapt to e… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
110
0
2

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 155 publications
(112 citation statements)
references
References 129 publications
0
110
0
2
Order By: Relevance
“…Kharon malware dataset was collected in 2016 to gauge the performance of research experiments [184]. Kharon malware dataset is a collection of android documented malware attacks [185].…”
Section: B Com M Only Used Security Datasetsmentioning
confidence: 99%
“…Kharon malware dataset was collected in 2016 to gauge the performance of research experiments [184]. Kharon malware dataset is a collection of android documented malware attacks [185].…”
Section: B Com M Only Used Security Datasetsmentioning
confidence: 99%
“…The feature extraction task is responsible for distilling meaningful features 0 x 0 from the captured and parsed network traffic. Feature selection [34] has key importance in determining the accuracy of an intrusion detection system. IDSIoT-SDL uses deep learning feature extraction from the captured data.…”
Section: Activity Analysermentioning
confidence: 99%
“…The dataset for training machine/deep learning algorithms for IDS mainly include KDD Cup'99, NSD-KDD, UNB ISCX, DARPA KDD [34]. The CSE-CIC-IDS2018 is used as dataset for training in IDSIoT-SDL [35].…”
Section: Dataset For Idsiot-sdlmentioning
confidence: 99%
“…As mentioned, the detection of cyber-attacks is an established research area that has leveraged a range of technologies as it has evolved over the years [ 7 ] to cope with the exponential growth of cyber-attacks [ 8 ]. A range of ML-based models have been applied to the problem, including support vector machines, artificial neural networks, and k-means clustering [ 9 ]. Despite the discriminative power of these models, many cyber-attacks still remain undetected or have low rates of detection.…”
Section: Background and Related Workmentioning
confidence: 99%