Requirements for Training and Evaluation Dataset of Network and Host Intrusion Detection System

作者: Petteri Nevavuori , Tero Kokkonen

DOI: 10.1007/978-3-030-16184-2_51

关键词:

摘要: In the cyber domain, situational awareness of critical assets is extremely important. For achieving comprehensive awareness, accurate sensor information required. An important branch sensors are Intrusion Detection Systems (IDS), especially anomaly based intrusion detection systems applying artificial intelligence or machine learning for detection. This millennium has seen transformation industries due to developments in data modelling methods. The most crucial bottleneck IDS absence publicly available datasets compliant modern equipment, system design standards and threat landscape. predominant dataset, KDD Cup 1999, still actively used research despite expressed criticism. Other, more recent datasets, tend record only either from perimeters testbed environment’s network traffic effects that malware on a single host machine. Our study focuses forming set requirements holistic Network Host System (NHIDS) dataset by reviewing existing studied within field modelling. As result, state-of-the-art NHIDS presented be utilised development intelligence.

参考文章(28)
Anna Sperotto, Ramin Sadre, Frank van Vliet, Aiko Pras, A Labeled Data Set for Flow-Based Intrusion Detection ip operations and management. pp. 39- 50 ,(2009) , 10.1007/978-3-642-04968-2_4
Adamu I Abubakar, Haruna Chiroma, Sanah Abdullahi Muaz, Libabatu Baballe Ila, None, A Review of the Advances in Cyber Security Benchmark Datasets for Evaluating Data-Driven Based Intrusion Detection Systems Procedia Computer Science. ,vol. 62, pp. 221- 227 ,(2015) , 10.1016/J.PROCS.2015.08.443
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji, Intrusion detection using sequences of system calls Journal of Computer Security. ,vol. 6, pp. 151- 180 ,(1998) , 10.3233/JCS-980109
Gideon Creech, Jiankun Hu, Generation of a new IDS test dataset: Time to retire the KDD collection wireless communications and networking conference. pp. 4487- 4492 ,(2013) , 10.1109/WCNC.2013.6555301
Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, Ali A. Ghorbani, Toward developing a systematic approach to generate benchmark datasets for intrusion detection Computers & Security. ,vol. 31, pp. 357- 374 ,(2012) , 10.1016/J.COSE.2011.12.012
S. García, M. Grill, J. Stiborek, A. Zunino, An empirical comparison of botnet detection methods Computers & Security. ,vol. 45, pp. 100- 123 ,(2014) , 10.1016/J.COSE.2014.05.011
S. Saad, I. Traore, A. Ghorbani, B. Sayed, D. Zhao, Wei Lu, J. Felix, P. Hakimian, Detecting P2P botnets through network behavior analysis and machine learning conference on privacy, security and trust. pp. 174- 180 ,(2011) , 10.1109/PST.2011.5971980
Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, Ali A. Ghorbani, A detailed analysis of the KDD CUP 99 data set computational intelligence and security. pp. 53- 58 ,(2009) , 10.1109/CISDA.2009.5356528
Mahbod Tavallaee, Natalia Stakhanova, Ali Akbar Ghorbani, Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods systems man and cybernetics. ,vol. 40, pp. 516- 524 ,(2010) , 10.1109/TSMCC.2010.2048428
Gideon Creech, Jiankun Hu, A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns IEEE Transactions on Computers. ,vol. 63, pp. 807- 819 ,(2014) , 10.1109/TC.2013.13