2022
DOI: 10.1007/978-3-031-02447-4_21
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of UNSW-NB15 Datasets Using Machine Learning Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…The dataset contains traffic data from real network environments including 9 types of attacks such as Fuzzers, Analysi, Backdoors, Exploits, Generic, etc. Azeroual, H. et al cleaned the data and identified the most important features, evaluated multiple machine learning algorithms using PCA and yielded effective results for attack classification with the proposed DT-PCA model [3] . The CIC-IDS series dataset was created by the Cybersecurity Lab at Carleton University, Canada.…”
Section: Introductionmentioning
confidence: 99%
“…The dataset contains traffic data from real network environments including 9 types of attacks such as Fuzzers, Analysi, Backdoors, Exploits, Generic, etc. Azeroual, H. et al cleaned the data and identified the most important features, evaluated multiple machine learning algorithms using PCA and yielded effective results for attack classification with the proposed DT-PCA model [3] . The CIC-IDS series dataset was created by the Cybersecurity Lab at Carleton University, Canada.…”
Section: Introductionmentioning
confidence: 99%