2021
DOI: 10.1007/978-3-030-86261-9_15
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning for Network-Based Intrusion Detection Systems: An Analysis of the CIDDS-001 Dataset

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…The CIDDS [29] CIDDS dataset is a collection of network traffic data sets for evaluating intrusion detection systems based on anomalies. It was created by researchers from Hochschule Coburg in Germany, and it simulates a small business environment with normal and malicious activities.…”
Section: Cidds Datasetsmentioning
confidence: 99%
“…The CIDDS [29] CIDDS dataset is a collection of network traffic data sets for evaluating intrusion detection systems based on anomalies. It was created by researchers from Hochschule Coburg in Germany, and it simulates a small business environment with normal and malicious activities.…”
Section: Cidds Datasetsmentioning
confidence: 99%
“…Currently, the technological infrastructure with high networks and systems, is collecting significant data amounts and analytics which are instrumental for critical cyber security systems [111]. Majority of threat detection systems focus on surface attacks, such as firewalls, whose protection is medial and doesn't account for lateral threats that infiltrate networks, remaining unseen [112], [113].The studies in [114], [115], [116] have established that only about 20% of threats are medial.…”
Section: Common Non-artificial Intelligence Based Techniquesmentioning
confidence: 99%
“…Due to its straight forward design, research in selecting the NN in K-NN is optimized till recently [31]. Because of its simple interpretation and easy implementation, K-NN is still a most used ML algorithms for jamming, intrusion, anomaly detection in different kind of networks [32][33][34][35][36]. In this paper, an efficient LSH based K-NN is developed, deployed and evaluated for jamming detection in IoT networks.…”
Section: Related Workmentioning
confidence: 99%