scispace - formally typeset
Open AccessProceedings ArticleDOI

Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization

Reads0
Chats0
TLDR
A reliable dataset is produced that contains benign and seven common attack network flows, which meets real world criteria and is publicly avaliable and evaluates the performance of a comprehensive set of network traffic features and machine learning algorithms to indicate the best set of features for detecting the certain attack categories.
Abstract
With exponential growth in the size of computer networks and developed applications, the significant increasing of the potential damage that can be caused by launching attacks is becoming obvious. Meanwhile, Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are one of the most important defense tools against the sophisticated and ever-growing network attacks. Due to the lack of adequate dataset, anomaly-based approaches in intrusion detection systems are suffering from accurate deployment, analysis and evaluation. There exist a number of such datasets such as DARPA98, KDD99, ISC2012, and ADFA13 that have been used by the researchers to evaluate the performance of their proposed intrusion detection and intrusion prevention approaches. Based on our study over eleven available datasets since 1998, many such datasets are out of date and unreliable to use. Some of these datasets suffer from lack of traffic diversity and volumes, some of them do not cover the variety of attacks, while others anonymized packet information and payload which cannot reflect the current trends, or they lack feature set and metadata. This paper produces a reliable dataset that contains benign and seven common attack network flows, which meets real world criteria and is publicly avaliable. Consequently, the paper evaluates the performance of a comprehensive set of network traffic features and machine learning algorithms to indicate the best set of features for detecting the certain attack categories.

read more

Citations
More filters
Journal ArticleDOI

Threat classification model for security information event management focusing on model efficiency

TL;DR: In this article , the authors focused on the excessive overhead incurred in learning and classifying large sets of threat events using deep learning models, which becomes an overhead in actual SIEM operations and selected representative deep learning-based models for threat classification, such as CNN, LSTM, and GRU, based on the models used in previous studies.
Journal ArticleDOI

A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks

TL;DR: In this article , a deep learning classifiers' ensemble is trained on four benchmark IDS datasets for testing the unknown attack instances, but the model has no prior knowledge of some labels and traffic patterns in those experiments.
Proceedings ArticleDOI

Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018

TL;DR: In this article , the authors provide a critical review of CIC-CSE-IDS-2018, and demonstrate the implications of these errors through several experiments, as well as a fully-recreated dataset, with labeling logic that has been reverse-engineered, corrected, and made publicly available for the first time.
Journal ArticleDOI

Preserving authentication and availability security services through Multivariate Statistical Network Monitoring

TL;DR: The Multivariate Statistical Network Monitoring (MSNM) is a promising methodology for anomaly detection as demonstrated in several works and its practical application is tested by means of the tool called MSNM-Sensor, which outperforms similar state of the art approaches in common and harmful network attacks included in recently built network datasets.
Journal ArticleDOI

Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach

TL;DR: In this paper , a geometric graph alignment (GGA) approach is leveraged to mask the geometric heterogeneities between domains for better intrusion knowledge transfer, where each intrusion domain is formulated as a graph where vertices and edges represent intrusion categories and category-wise interrelationships, respectively.
References
More filters
Proceedings ArticleDOI

A detailed analysis of the KDD CUP 99 data set

TL;DR: A new data set is proposed, NSL-KDD, which consists of selected records of the complete KDD data set and does not suffer from any of mentioned shortcomings.
Journal ArticleDOI

Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory

TL;DR: The purpose of this article is to attempt to identify the shortcomings of the Lincoln Lab effort in the hope that future efforts of this kind will be placed on a sounder footing.
Journal ArticleDOI

Toward developing a systematic approach to generate benchmark datasets for intrusion detection

TL;DR: The intent for this dataset is to assist various researchers in acquiring datasets of this kind for testing, evaluation, and comparison purposes, through sharing the generated datasets and profiles.
Proceedings ArticleDOI

Characterization of Tor Traffic using Time based Features.

TL;DR: A time analysis on Tor traffic flows is presented, captured between the client and the entry node, to detect the application type: Browsing, Chat, Streaming, Mail, Voip, P2P or File Transfer.
Proceedings ArticleDOI

Generation of a new IDS test dataset: Time to retire the KDD collection

TL;DR: A new publicly available dataset is introduced which is representative of modern attack structure and methodology and is contrasted with the legacy datasets, and the performance difference of commonly used intrusion detection algorithms is highlighted.
Related Papers (5)