4.6 Article

Evaluation of Machine Learning Techniques for Traffic Flow-Based Intrusion Detection

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Machine learning approaches to network intrusion detection for contemporary internet traffic

Muhammad U. Ilyas et al.

Summary: This article discusses the importance of network intrusion detection systems in protecting computing infrastructure from external attacks, and presents five different Machine Learning classifiers developed using the CSE-CIC-IDS2018 dataset. The article points out that the significant Internet trends of the last two decades demand a reevaluation and redevelopment of intrusion detectors.

COMPUTING (2022)

Proceedings Paper Computer Science, Information Systems

Network Intrusion Detection: A Comprehensive Analysis of CIC-IDS2017

Arnaud Rosay et al.

Summary: As the number of connected devices increases, network intrusion detection becomes more crucial. Analysis of older datasets revealed issues, which newer datasets aim to address. CIC-IDS2017 dataset, with raw data and flow-based features, is widely used for network intrusion detection.

PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP) (2021)

Review Computer Science, Information Systems

Research Trends in Network-Based Intrusion Detection Systems: A Review

Satish Kumar et al.

Summary: This article reviews the evolving network threats and the protective mechanisms used, including intrusion detection systems. It analyzes research trends, methodologies, and common datasets for evaluating IDS Models, as well as the popularity of different approaches based on citation and publication data over the past 15 years.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Machine Learning in Network Anomaly Detection: A Survey

Song Wang et al.

Summary: Anomalies pose threats to networks that have never occurred before. Protecting networks against malicious access remains a challenge, especially with the evolution of new technologies and connected devices. Machine learning offers a novel and flexible approach for detecting intrusions in networks, applicable to any network structure.

IEEE ACCESS (2021)

Proceedings Paper Computer Science, Information Systems

Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study

Gints Engelen et al.

Summary: The paper explores the effectiveness of machine learning in network intrusion detection and the challenges faced in applying it to large-scale network environments. By revisiting the CICIDS2017 dataset and addressing issues in data processing, improvements in model evaluation were achieved. Addressing data collection issues can have a significant impact on the performance of machine learning algorithms and recommendations for anticipation and prevention are provided.

2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021) (2021)

Article Computer Science, Theory & Methods

Apply machine learning techniques to detect malicious network traffic in cloud computing

Amirah Alshammari et al.

Summary: The research proposes a detection framework using machine learning models to detect anomalies in network traffic. By extracting features and training models on the ISOT-CID dataset, significant results were achieved, encouraging future research expansion.

JOURNAL OF BIG DATA (2021)

Proceedings Paper Computer Science, Artificial Intelligence

A Review of the Advancement in Intrusion Detection Datasets

Ankit Thakkar et al.

INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE (2020)

Article Computer Science, Information Systems

CICIDS-2017 Dataset Feature Analysis With Information Gain for Anomaly Detection

Kurniabudi et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection

Razan Abdulhammed et al.

ELECTRONICS (2019)

Article Chemistry, Multidisciplinary

Performance Analysis of Feature Selection Methods in Software Defect Prediction: A Search Method Approach

Abdullateef Oluwagbemiga Balogun et al.

APPLIED SCIENCES-BASEL (2019)

Article Computer Science, Information Systems

A survey of network-based intrusion detection data sets

Markus Ring et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Information Systems

UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs

Gabriel Macia-Fernandez et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

Flow-based intrusion detection: Techniques and challenges

Muhammad Fahad Umer et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Information Systems

A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

Anna L. Buczak et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Review Computer Science, Hardware & Architecture

A survey of network anomaly detection techniques

Mohiuddin Ahmed et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Information Systems

Network Anomaly Detection: Methods, Systems and Tools

Monowar H. Bhuyan et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Information Systems

Toward developing a systematic approach to generate benchmark datasets for intrusion detection

Ali Shiravi et al.

COMPUTERS & SECURITY (2012)

Article Computer Science, Information Systems

Anomaly-based network intrusion detection: Techniques, systems and challenges

P. Garcia-Teodoro et al.

COMPUTERS & SECURITY (2009)

Review Computer Science, Artificial Intelligence

Intrusion detection by machine learning: A review

Chih-Fong Tsai et al.

EXPERT SYSTEMS WITH APPLICATIONS (2009)

Article Computer Science, Artificial Intelligence

Random forests

L Breiman

MACHINE LEARNING (2001)

Article Computer Science, Hardware & Architecture

The 1999 DARPA off-line intrusion detection evaluation

R Lippmann et al.

COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING (2000)