Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization
Citations
847 citations
Cites background from "Toward Generating a New Intrusion D..."
...The details of various IDS datasets are discussed in [66], [59]....
[...]
...Recently, to provide benchmark dataset to the research community, [59] generated reliable dataset....
[...]
736 citations
684 citations
Cites background from "Toward Generating a New Intrusion D..."
...tack, Infiltration, Botnet and DDoS (Sharafaldin et al., 2018)....
[...]
...This dataset contains network traffic traces from Distributed Denial-of-Service (DDoS) attacks, and was collected in 2007 (Hick et al., 2007)....
[...]
...CICIDS 2017 CICIDS2017 dataset comprises both benign behaviour and also details of new malware attacks: such as Brute Force FTP, Brute Force SSH, DoS, Heartbleed, Web Attack, Infiltration, Botnet and DDoS (Sharafaldin et al., 2018)....
[...]
494 citations
Cites methods from "Toward Generating a New Intrusion D..."
...Profile [94] approach to outline the behavior on HTTP, HTTPS, FTP, SSH and e-mail protocols....
[...]
464 citations
Cites background from "Toward Generating a New Intrusion D..."
...[6], which implements attacks include Brute Force SSH, DoS, Heartbleed, Web Attack, Infiltration, Botnet and DDoS, and Brute Force FTP....
[...]
...In order to test the efficiency of such mechanisms, reliable datasets are needed that (i) contain both benign and several attacks, (ii) meet real world criteria, and (iii) are publicly available [6]....
[...]
References
3,300 citations
"Toward Generating a New Intrusion D..." refers background or methods in this paper
...KDD’99 (University of California, Irvine 1998-99): This dataset is an updated version of the DARPA98, by processing the tcpdump portion....
[...]
...This dataset has a large number of redundant records and is studded by data corruptions that led to skewed testing results (Tavallaee et al., 2009)....
[...]
...NSL-KDD was created using KDD (Tavallaee et al., 2009) to address some of the KDD’s shortcomings (McHugh, 2000)....
[...]
1,346 citations
"Toward Generating a New Intrusion D..." refers background or methods in this paper
...Moreover, it lacks actual attack data records (McHugh, 2000) (Brown et al....
[...]
...Moreover, it lacks actual attack data records (McHugh, 2000) (Brown et al., 2009)....
[...]
..., 2009) to address some of the KDD’s shortcomings (McHugh, 2000)....
[...]
...NSL-KDD was created using KDD (Tavallaee et al., 2009) to address some of the KDD’s shortcomings (McHugh, 2000)....
[...]
1,050 citations
425 citations
"Toward Generating a New Intrusion D..." refers methods in this paper
...We begin to extract the 80 traffic features from the dataset using CICFlowMeter (CICFlowMeter, 2017),(Habibi Lashkari et al., 2017)....
[...]
...For extracting the network traffic features, we used the CICFlowMeter (CICFlowMeter, 2017), (Habibi Lashkari et al., 2017), which is a flow based feature extractor and can extract 80 features from a pcap file....
[...]
...The dataset is completely labelled and more than 80 network traffic features extracted and calculated for all benign and intrusive flows by using CICFlowMeter software which is publicly available in Canadian Institute for Cybersecurity website (Habibi Lashkari et al., 2017)....
[...]
268 citations
"Toward Generating a New Intrusion D..." refers methods in this paper
...ADFA (University of New South Wales 2013): This dataset includes normal training and validating data and 10 attacks per vector (Creech and Hu, 2013)....
[...]