2021
DOI: 10.1016/j.jnca.2021.103212
|View full text |Cite
|
Sign up to set email alerts
|

CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 12 publications
0
0
0
Order By: Relevance
“…Additionally, the paper states that future research should focus on detecting unbalanced and new data types and finding or building good algorithms for this purpose. Bui et al [72] describe a toolchain that automates the process of feature extraction, data labeling, and assessing the quality of created datasets from various sources, including network traffic, system logs, and monitoring software reports. It also allows for the validation and customization of datasets.…”
Section: Data Lackmentioning
confidence: 99%
“…Additionally, the paper states that future research should focus on detecting unbalanced and new data types and finding or building good algorithms for this purpose. Bui et al [72] describe a toolchain that automates the process of feature extraction, data labeling, and assessing the quality of created datasets from various sources, including network traffic, system logs, and monitoring software reports. It also allows for the validation and customization of datasets.…”
Section: Data Lackmentioning
confidence: 99%
“…A new automated toolchain, called CREAM, has been created by the developers of [25]. This toolchain combines various tools to automate the whole process of configuration, attack and benign behavior reproduction, data collection, feature extraction, data labeling, and evaluation.…”
Section: Dataset Collectionmentioning
confidence: 99%
“…Weinger et al [8], applied their proposed data augmentation method to DS2OS and ToN_IoT datasets for intrusion detection on IoT networks. Bui et al [9], established a toolchain called Configuration, REproduction, Multi-dataset, and Evaluation (CREME) to increase the intrusion detection capabilities of IDS, and measured both a new dataset and the quality of the dataset they created. Haider et al [10], proposed the Fuzzy Gaussian Mixture-based Correntropy-Host Anomaly Detection Systems (FGMC-HADS) method based on the Fuzzy Rough Attribute Reduction (FRAR) method and the Gaussian Mixture Model (GMM).…”
Section: Introduction (Gi̇ri̇ş)mentioning
confidence: 99%