2022
DOI: 10.36227/techrxiv.19877311.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

UNR-IDD: Intrusion Detection Dataset using Network Port Statistics

Abstract: <div>With the expanded applications of modern-day networking, network infrastructures are at risk from cyber attacks and intrusions. Multiple datasets have been proposed in literature that can be used to create Machine Learning (ML) based Network Intrusion Detection Systems (NIDS). However, many of these datasets suffer from sub-optimal performance and do not adequately represent all types of intrusions in an effective manner. Another problem with these datasets is the low accuracy of tail classes. To a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…This section shows a discussion of the LightGBM Algorithm, which is known as data-driven AI. 30 LightGBM is a decision-tree-based gradient-boosting ensemble approach utilized by the train using auto ML tool. LightGBM may be used for classification and regression, much as other decision tree-based methods.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…This section shows a discussion of the LightGBM Algorithm, which is known as data-driven AI. 30 LightGBM is a decision-tree-based gradient-boosting ensemble approach utilized by the train using auto ML tool. LightGBM may be used for classification and regression, much as other decision tree-based methods.…”
Section: Methodsmentioning
confidence: 99%
“…This section shows a discussion of the LightGBM Algorithm, which is known as data‐driven AI 30 . LightGBM is a decision‐tree‐based gradient‐boosting ensemble approach utilized by the train using auto ML tool.…”
Section: Methodsmentioning
confidence: 99%
“…All SDN controllers communicate with a centralized command center as seen in Figure 2. For experimentation, we are using the UNR-IDD dataset [39], as it is a relevant NIDS dataset for our experiments. The dataset contains 37,412 data samples and 34 features per sample and possesses multiple control and data plane attacks that can occur on SDN setups like TCP-SYN, Flow Table Overflow, Traffic Diversion, Blackhole, and Port Scanning.…”
Section: Experimental Results and Analysis A Setupmentioning
confidence: 99%