2017
DOI: 10.13052/jsn2445-9739.2017.009
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Reliable Intrusion Detection Benchmark Dataset

Abstract: The urgently growing number of security threats on Internet and intranet networks highly demands reliable security solutions. Among various options, Intrusion Detection (IDSs) and Intrusion Prevention Systems (IPSs) are used to defend network infrastructure by detecting and preventing attacks and malicious activities. The performance of a detection system is evaluated using benchmark datasets. There exist a number of datasets, such as DARPA98, KDD99, ISC2012, and ADFA13, that have been used by researchers to e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
115
0
6

Year Published

2018
2018
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 212 publications
(123 citation statements)
references
References 17 publications
2
115
0
6
Order By: Relevance
“…For the experiments, we implemented the proposed approach (genetic algorithm and the two anomaly‐based intrusion detection methods) on the Apache Spark and used the CICIDS2017 dataset, which is distributed into eight CSV files (and respective PCAP files). We describe in Table the content of each file referring to them as “File k ,” for k = 0.0.7.…”
Section: Experiments and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…For the experiments, we implemented the proposed approach (genetic algorithm and the two anomaly‐based intrusion detection methods) on the Apache Spark and used the CICIDS2017 dataset, which is distributed into eight CSV files (and respective PCAP files). We describe in Table the content of each file referring to them as “File k ,” for k = 0.0.7.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…We implemented our approach on a scalable architecture supported by Apache Spark and we used in the presented experiments the CICIDS2017 dataset proposed by Sharafaldin et al The approach provided good results in terms of adaptability, detection rates (DR), and FPR. The results varied depending on the attack types.…”
Section: Introductionmentioning
confidence: 99%
“…We do not develop an evaluation score like Haider et al [19] or Sharafaldin et al [30] since we do not want to judge the importance of different data set properties. In our opinion, the importance of certain properties depends on the specific evaluation scenario and should not be generally judged in a survey.…”
Section: Data Set Propertiesmentioning
confidence: 99%
“…Normal user behavior includes HTTP, SMTP, SSH and SNMP traffic while malicious network traffic encompasses port scans and DoS attacks. TRAbID is publicly available 30 .…”
Section: Data Setmentioning
confidence: 99%
“…Each solution processes its information from files, since the vulnerabilities have been encountered in an enriched ".XML" (.nessus) [12], and both the real-time files and the filtering work in a ".txt" file. We generated a transformation flow for the vulnerabilities, which originated from the PVS system (Fig.…”
Section: Design and Implementation Of Algorithms And The Applicatimentioning
confidence: 99%