Generation of a new IDS test dataset: Time to retire the KDD collection

作者: Gideon Creech , Jiankun Hu

DOI: 10.1109/WCNC.2013.6555301

关键词: Test dataStructure (mathematical logic)Computer scienceData miningTest (assessment)Intrusion detection system

摘要: … Intrusion Detection Systems (IDS), and monitor the activity on a single host. By contrast, Network IDS … by a central authority, and the IDS then matches observed behaviour against these …

参考文章(30)
Philippe Owezarski, A database of anomalous traffic for assessing profile based IDS traffic monitoring and analysis. pp. 59- 72 ,(2010) , 10.1007/978-3-642-12365-8_5
Sanjay Rawat, V. P. Gulati, Arun K. Pujari, A Fast Host-Based Intrusion Detection System Using Rough Set Theory Transactions on Rough Sets IV. ,vol. 4, pp. 144- 161 ,(2005) , 10.1007/11574798_8
Zenghui Liu, Yingxu Lai, A Data Mining Framework for Building Intrusion Detection Models Based on IPv6 information security and assurance. pp. 608- 618 ,(2009) , 10.1007/978-3-642-02617-1_62
Matthew V. Mahoney, Philip K. Chan, An analysis of the 1999 DARPA/lincoln Laboratory evaluation data for network anomaly detection recent advances in intrusion detection. pp. 220- 237 ,(2003) , 10.1007/978-3-540-45248-5_13
Peter Stavroulakis, Mark Stamp, Handbook of Information and Communication Security Springer Publishing Company, Incorporated. ,(2010) , 10.1007/978-3-642-04117-4
Wenke Lee, S.J. Stolfo, K.W. Mok, A data mining framework for building intrusion detection models ieee symposium on security and privacy. pp. 120- 132 ,(1999) , 10.1109/SECPRI.1999.766909
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji, Intrusion detection using sequences of system calls Journal of Computer Security. ,vol. 6, pp. 151- 180 ,(1998) , 10.3233/JCS-980109
Vegard Engen, Jonathan Vincent, Keith Phalp, Exploring discrepancies in findings obtained with the KDD Cup '99 data set intelligent data analysis. ,vol. 15, pp. 251- 276 ,(2011) , 10.3233/IDA-2010-0466
John McHugh, Testing Intrusion detection systems ACM Transactions on Information and System Security. ,vol. 3, pp. 262- 294 ,(2000) , 10.1145/382912.382923
Biming Tian, Song Han, Jiankun Hu, Tharam Dillon, A mutual-healing key distribution scheme in wireless sensor networks Journal of Network and Computer Applications. ,vol. 34, pp. 80- 88 ,(2011) , 10.1016/J.JNCA.2010.09.002