Public domain datasets for optimizing network intrusion and machine learning approaches

作者: Maznan Deraman , Abd Jalil Desa , Zulaiha Ali Othman

DOI: 10.1109/DMO.2011.5976504

关键词:

摘要: Network intrusion detection system (NIDS) commonly attributed to the task mitigate network and security attacks that has potential compromise safety of a resources its information. Research in this area mainly focuses improve method traffic flow. Machine learning techniques had been widely used analyze large datasets including traffic. In order develop sound mechanism for NIDS tool, benchmark is required assist data mining process. This paper presents available publicly study such as KDDCup99, IES, pcapr others. We use some popular machine tools visualize properties characteristics datasets.

参考文章(12)
L. Deri, Gaia Maselli, S. Suin, Design and Implementation of an Anomaly Detection System: an Empirical Approach In Proceedings of Terena Networking Conference. pp. 2001- ,(2003)
Chengcheng Li, Tijjani Mohammed, Peng Li, Building a repository of network traffic captures for information assurance education Journal of Computing Sciences in Colleges. ,vol. 24, pp. 99- 105 ,(2009)
Martin Rehak, Michal Pechoucek, Martin Grill, Karel Bartos, Pavel Celeda, Vojtech Krmicek, Collaborative Approach to Network Behavior Analysis International Conference on Global e-Security. ,vol. 12, pp. 153- 160 ,(2008) , 10.1007/978-3-540-69403-8_19
Marcin Wojnarski, Sebastian Stawicki, Piotr Wojnarowski, TunedIT.org: System for Automated Evaluation of Algorithms in Repeatable Experiments Rough Sets and Current Trends in Computing. pp. 20- 29 ,(2010) , 10.1007/978-3-642-13529-3_4
Zulaiha Ali Othman, Azuraliza Abu Bakar, Intesar Etubal, Improving signature detection classification model using features selection based on customized features intelligent systems design and applications. pp. 1026- 1031 ,(2010) , 10.1109/ISDA.2010.5687051
Maznan Deraman, Jalil Md Desa, Zulaiha Ali Othman, Multilayer packet tagging for network behaviour analysis 2010 International Symposium on Information Technology. ,vol. 2, pp. 909- 913 ,(2010) , 10.1109/ITSIM.2010.5561573
A.A. Cardenas, J.S. Baras, K. Seamon, A framework for the evaluation of intrusion detection systems ieee symposium on security and privacy. pp. 63- 77 ,(2006) , 10.1109/SP.2006.2
Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, Ali A. Ghorbani, A detailed analysis of the KDD CUP 99 data set computational intelligence and security. pp. 53- 58 ,(2009) , 10.1109/CISDA.2009.5356528
Stefano Zanero, ULISSE, a network intrusion detection system Proceedings of the 4th annual workshop on Cyber security and informaiton intelligence research developing strategies to meet the cyber security and information intelligence challenges ahead - CSIIRW '08. pp. 20- ,(2008) , 10.1145/1413140.1413163