LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion Detection

作者: Robertas Damasevicius , Algimantas Venckauskas , Sarunas Grigaliunas , Jevgenijus Toldinas , Nerijus Morkevicius

DOI: 10.3390/ELECTRONICS9050800

关键词:

摘要: … the real-world academic network. The dataset presents real-world examples of normal and under-attack network traffic. We describe and analyze 85 network flow features of the dataset …

参考文章(74)
Hung-Jen Liao, Chun-Hung Richard Lin, Ying-Chih Lin, Kuang-Yuan Tung, Review: Intrusion detection system: A comprehensive review Journal of Network and Computer Applications. ,vol. 36, pp. 16- 24 ,(2013) , 10.1016/J.JNCA.2012.09.004
Sangeeta Bhattacharya, S. Selvakumar, SSENet-2014 Dataset: A Dataset for Detection of Multiconnection Attacks international conference on engineering of complex computer systems. pp. 121- 126 ,(2014) , 10.1109/ICECCS.2014.100
Janez Demšar, Statistical Comparisons of Classifiers over Multiple Data Sets Journal of Machine Learning Research. ,vol. 7, pp. 1- 30 ,(2006)
Hans-Peter Kriegel, Martin Ester, Jörg Sander, Xiaowei Xu, A density-based algorithm for discovering clusters in large spatial Databases with Noise knowledge discovery and data mining. pp. 226- 231 ,(1996)
Zheng Yan, Peng Zhang, Athanasios V. Vasilakos, A security and trust framework for virtualized networks and software-defined networking Security and Communication Networks. ,vol. 9, pp. 3059- 3069 ,(2016) , 10.1002/SEC.1243
Julian Jang-Jaccard, Surya Nepal, None, A survey of emerging threats in cybersecurity Journal of Computer and System Sciences. ,vol. 80, pp. 973- 993 ,(2014) , 10.1016/J.JCSS.2014.02.005
Monowar H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita, Network Anomaly Detection: Methods, Systems and Tools IEEE Communications Surveys and Tutorials. ,vol. 16, pp. 303- 336 ,(2014) , 10.1109/SURV.2013.052213.00046
Pedro Casas, Johan Mazel, Philippe Owezarski, Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge Computer Communications. ,vol. 35, pp. 772- 783 ,(2012) , 10.1016/J.COMCOM.2012.01.016
Gideon Creech, Jiankun Hu, Generation of a new IDS test dataset: Time to retire the KDD collection wireless communications and networking conference. pp. 4487- 4492 ,(2013) , 10.1109/WCNC.2013.6555301
Alif Wahid, Christopher Leckie, Chenfeng Zhou, None, Estimating the number of hosts corresponding to an intrusion alert while preserving privacy Journal of Computer and System Sciences. ,vol. 80, pp. 502- 519 ,(2014) , 10.1016/J.JCSS.2013.06.007