2017
DOI: 10.1016/j.jnca.2017.03.018
|View full text |Cite
|
Sign up to set email alerts
|

Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
88
0
4

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 164 publications
(93 citation statements)
references
References 18 publications
1
88
0
4
Order By: Relevance
“…Larger Cross-evaluation. We emphasize that comparing UNI-CORN with other existing IDS (most of which are syscallbased) is difficult for several reasons: A) many IDS are not open-source; B) existing public IDS datasets are either outdated [4], [85] or require a translation [28], [50], [51] from, e.g., syscall traces to data provenance, which is challenging and sometimes impossible (due to lack of information); C) systems that create their own private datasets only superficially describe their experimental procedures, making it difficult to fairly reproduce the experiments for provenance data. We believe that such a meta-study is a worthwhile endeavor that we plan to pursue in future work.…”
Section: Discussion and Limitationsmentioning
confidence: 99%
“…Larger Cross-evaluation. We emphasize that comparing UNI-CORN with other existing IDS (most of which are syscallbased) is difficult for several reasons: A) many IDS are not open-source; B) existing public IDS datasets are either outdated [4], [85] or require a translation [28], [50], [51] from, e.g., syscall traces to data provenance, which is challenging and sometimes impossible (due to lack of information); C) systems that create their own private datasets only superficially describe their experimental procedures, making it difficult to fairly reproduce the experiments for provenance data. We believe that such a meta-study is a worthwhile endeavor that we plan to pursue in future work.…”
Section: Discussion and Limitationsmentioning
confidence: 99%
“…Other works similar to this one usually achieve high classification performance rates, although this is mainly motivated by the flaws found in KDDCup'99 dataset. This assumption is confirmed by comparing accuracy results obtained in [15] through classical ML algorithms against the ones obtained by using the same ML methods but, in this case, considering a recent and realistic dataset: NGIDS-DS [16]. Although the same ML algorithms were used for comparison, no specific details were mentioning the methodology followed by the authors.…”
Section: Recent Work and Methodsmentioning
confidence: 77%
“…ISOT was used for detecting P2P botnets [57]. The resulting data set is publicly available 19 and contains 11 GB of packet-based data in pcap format.…”
Section: Data Setmentioning
confidence: 99%