2021
DOI: 10.3390/e23111532
|View full text |Cite
|
Sign up to set email alerts
|

How to Effectively Collect and Process Network Data for Intrusion Detection?

Abstract: The number of security breaches in the cyberspace is on the rise. This threat is met with intensive work in the intrusion detection research community. To keep the defensive mechanisms up to date and relevant, realistic network traffic datasets are needed. The use of flow-based data for machine-learning-based network intrusion detection is a promising direction for intrusion detection systems. However, many contemporary benchmark datasets do not contain features that are usable in the wild. The main contributi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 69 publications
0
11
0
Order By: Relevance
“…One of the prevalent research problems in the domain of intrusion detection is the changing characteristics of both network traffic and the modern threat landscape (Komisarek et al, 2021a). The rate of change in the field is inextricably linked to the intensity of the cyberarms race.…”
Section: Empirical Reviewmentioning
confidence: 99%
“…One of the prevalent research problems in the domain of intrusion detection is the changing characteristics of both network traffic and the modern threat landscape (Komisarek et al, 2021a). The rate of change in the field is inextricably linked to the intensity of the cyberarms race.…”
Section: Empirical Reviewmentioning
confidence: 99%
“…Plenty of them focus on the application or bettering of the algorithms, while using outdated NIDS benchmark datasets, or datasets with features which are unobtainable in a real-world setting while working on live traffic. As noted in [45] and [27], current benchmark datasets lack the common feature and label space. Cybersecurity is a domain flourishing with every new component or technology released.…”
Section: Related Workmentioning
confidence: 99%
“…Research on the Machine-Learning (ML) Based Network Intrusion Detection Systems (NIDS) is of high interest in the scientific community and in industrial practice [30][47] [23]. One of the major obstacles to the wide deployment of ML-based NIDS is the necessity to collect labelled data on premises of the protected network [27], since the ML-components need to learn the specific data distributions. The collection of this type of data requires specialist knowledge and adequate resources [35].…”
Section: Introductionmentioning
confidence: 99%
“…The authors of [ 13 ] establish the minimal amount of data that is sufficient to efficiently train machine learning algorithms in intrusion detection. The authors also identify the most valuable NetFlow-based features that facilitate effective, machine-learning-based network intrusion detection in the real world.…”
mentioning
confidence: 99%
“…Their objectives are reached in a series of experiments with the use of several feature selection techniques, machine learning algorithms and intrusion detection benchmark datasets. The paper [ 13 ] is the result of the EU Horizon 2020 SIMARGL project (simargl.eu).…”
mentioning
confidence: 99%