Machine learning methods for cyber security intrusion detection: Datasets and comparative study

作者: Kilincer , I. F. , Ertam , F. , Sengur

DOI: 10.1016/J.COMNET.2021.107840

关键词:

摘要: … detection capability of IDS datasets. In this research, we presented a machine learning … Behind these, the importance of network intrusion detection systems is emphasized and the …

参考文章(56)
William G.J. Halfond, Alessandro Orso, Jeremy Viegas, A Classification of SQL-Injection Attacks and Countermeasures Proceedings of the International Symposium on Secure Software Engineering. ,(2006)
Asmaa Shaker Ashoor, Sharad Gore, Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) International Conference on Network Security and Applications. pp. 497- 501 ,(2011) , 10.1007/978-3-642-22540-6_48
Ja Jabez, BJPCS Muthukumar, None, Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach Procedia Computer Science. ,vol. 48, pp. 338- 346 ,(2015) , 10.1016/J.PROCS.2015.04.191
Sara Haddou Bouazza, Nezha Hamdi, Abdelouhab Zeroual, Khalid Auhmani, Gene-expression-based cancer classification through feature selection with KNN and SVM classifiers 2015 Intelligent Systems and Computer Vision (ISCV). pp. 1- 6 ,(2015) , 10.1109/ISACV.2015.7106168
Stephen W. Boyd, Angelos D. Keromytis, SQLrand: Preventing SQL Injection Attacks applied cryptography and network security. pp. 292- 302 ,(2004) , 10.1007/978-3-540-24852-1_21
R.P. Lippmann, D.J. Fried, I. Graf, J.W. Haines, K.R. Kendall, D. McClung, D. Weber, S.E. Webster, D. Wyschogrod, R.K. Cunningham, M.A. Zissman, Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation darpa information survivability conference and exposition. ,vol. 2, pp. 12- 26 ,(2000) , 10.1109/DISCEX.2000.821506
S. Chakrabarti, M. Chakraborty, I. Mukhopadhyay, Study of snort-based IDS international conference & workshop on emerging trends in technology. pp. 43- 47 ,(2010) , 10.1145/1741906.1741914
Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, Stefanos Gritzalis, Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset IEEE Communications Surveys and Tutorials. ,vol. 18, pp. 184- 208 ,(2016) , 10.1109/COMST.2015.2402161
Maryam M. Najafabadi, Taghi M. Khoshgoftaar, Clifford Kemp, Naeem Seliya, Richard Zuech, Machine Learning for Detecting Brute Force Attacks at the Network Level bioinformatics and bioengineering. pp. 379- 385 ,(2014) , 10.1109/BIBE.2014.73
Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, Ali A. Ghorbani, Toward developing a systematic approach to generate benchmark datasets for intrusion detection Computers & Security. ,vol. 31, pp. 357- 374 ,(2012) , 10.1016/J.COSE.2011.12.012