A detailed analysis of the KDD CUP 99 data set
Citations
1,931 citations
Cites background or methods from "A detailed analysis of the KDD CUP ..."
...KDD’99 (University of California, Irvine 1998-99): This dataset is an updated version of the DARPA98, by processing the tcpdump portion....
[...]
...This dataset has a large number of redundant records and is studded by data corruptions that led to skewed testing results (Tavallaee et al., 2009)....
[...]
...NSL-KDD was created using KDD (Tavallaee et al., 2009) to address some of the KDD’s shortcomings (McHugh, 2000)....
[...]
1,745 citations
Cites background or methods from "A detailed analysis of the KDD CUP ..."
...Further, the signature based NIDSs cannot detect unknown attacks, and for these anomaly NIDS are recommended in many studies [4] [5]....
[...]
...Finally, the output files of the two different tools, Argus and Bro-IDS are stored in the SQL Server 20088 database to match the Argus and Bro-IDS generated features by using the flow features as reflected in Table II....
[...]
...Countering the unavailability of network benchmark data set challenges, this paper examines a UNSW-NB15 data set creation....
[...]
...Keywords- UNSW-NB15 data set; NIDS; low footprint attacks; pcap files; testbed I. INTRODUCTION Currently, due to the massive growth in computer networks and applications, many challenges arise for cyber security research....
[...]
1,704 citations
Cites background from "A detailed analysis of the KDD CUP ..."
...[21] and found to have some serious limitations....
[...]
1,123 citations
Cites methods from "A detailed analysis of the KDD CUP ..."
...In the binary classification experiments, we have compared the performance with an ANN, naive Bayesian, random forest, multi-layer perceptron, support vector machine and other machine learning methods, as mentioned in [13] and [21]....
[...]
...In [21], the authors have shown the results obtained by J48, Naive Bayesian, Random Forest, Multi-layer Perceptron, Support Vector Machine and the other classification algorithms, and the artificial neural network algorithm also gives 81....
[...]
...The NSL-KDD dataset [21], [22] generated in 2009 is widely used in intrusion detection experiments....
[...]
979 citations
Cites background from "A detailed analysis of the KDD CUP ..."
...to overcome the inherent problems of the KDD ’99 data set, which are discussed in [35]....
[...]
References
[...]
79,257 citations
"A detailed analysis of the KDD CUP ..." refers methods in this paper
...In a similar approach, we have selected seven widely used machine learning techniques, namely J48 decision tree learning [16], Naive Bayes [17], NBTree [18], Random Forest [19], Random Tree [20], Multilayer Perceptron [21], and Support Vector Machine (SVM) [22] from the Weka [23] collection to learn the overall behavior of the KDD’99 data set....
[...]
40,826 citations
"A detailed analysis of the KDD CUP ..." refers methods in this paper
...However, SVM is the only learning technique whose performance is improved on KDDTest+. Analyzing both test sets, we found that SVM wrongly detects one of the most frequent records in KDDTest, which highly affects its detection performance....
[...]
...As an example, classification of SVM on KDDTest is 65.01% which is quite poor compared to other learning approaches....
[...]
...In a similar approach, we have selected seven widely used machine learning techniques, namely J48 decision tree learning [16], Naive Bayes [17], NBTree [18], Random Forest [19], Random Tree [20], Multilayer Perceptron [21], and Support Vector Machine (SVM) [22] from the Weka [23] collection to learn the overall behavior of the KDD’99 data set....
[...]
...In contrast, in KDDTest+ since this record is only occurred once, it does not have any effects on the classification rate of SVM, and provides better evaluation of learning methods....
[...]
21,674 citations
8,046 citations
"A detailed analysis of the KDD CUP ..." refers methods in this paper
...In a similar approach, we have selected seven widely used machine learning techniques, namely J48 decision tree learning [16], Naive Bayes [17], NBTree [18], Random Forest [19], Random Tree [20], Multilayer Perceptron [21], and Support Vector Machine (SVM) [22] from the Weka [23] collection to learn the overall behavior of the KDD’99 data set....
[...]
3,071 citations
"A detailed analysis of the KDD CUP ..." refers methods in this paper
...In a similar approach, we have selected seven widely used machine learning techniques, namely J48 decision tree learning [16], Naive Bayes [17], NBTree [18], Random Forest [19], Random Tree [20], Multilayer Perceptron [21], and Support Vector Machine (SVM) [22] from the Weka [23] collection to learn the overall behavior of the KDD’99 data set....
[...]