Related references
Note: Only part of the references are listed.Machine learning approaches to network intrusion detection for contemporary internet traffic
Muhammad U. Ilyas et al.
COMPUTING (2022)
Network Intrusion Detection: A Comprehensive Analysis of CIC-IDS2017
Arnaud Rosay et al.
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP) (2021)
Research Trends in Network-Based Intrusion Detection Systems: A Review
Satish Kumar et al.
IEEE ACCESS (2021)
Machine Learning in Network Anomaly Detection: A Survey
Song Wang et al.
IEEE ACCESS (2021)
Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study
Gints Engelen et al.
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021) (2021)
Apply machine learning techniques to detect malicious network traffic in cloud computing
Amirah Alshammari et al.
JOURNAL OF BIG DATA (2021)
Impact of Feature Selection Methods on the Predictive Performance of Software Defect Prediction Models: An Extensive Empirical Study
Abdullateef O. Balogun et al.
SYMMETRY-BASEL (2020)
A Review of the Advancement in Intrusion Detection Datasets
Ankit Thakkar et al.
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE (2020)
CICIDS-2017 Dataset Feature Analysis With Information Gain for Anomaly Detection
Kurniabudi et al.
IEEE ACCESS (2020)
Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection
Razan Abdulhammed et al.
ELECTRONICS (2019)
Performance Analysis of Feature Selection Methods in Software Defect Prediction: A Search Method Approach
Abdullateef Oluwagbemiga Balogun et al.
APPLIED SCIENCES-BASEL (2019)
A survey of network-based intrusion detection data sets
Markus Ring et al.
COMPUTERS & SECURITY (2019)
UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs
Gabriel Macia-Fernandez et al.
COMPUTERS & SECURITY (2018)
Flow-based intrusion detection: Techniques and challenges
Muhammad Fahad Umer et al.
COMPUTERS & SECURITY (2017)
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
Anna L. Buczak et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)
A survey of network anomaly detection techniques
Mohiuddin Ahmed et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
Network Anomaly Detection: Methods, Systems and Tools
Monowar H. Bhuyan et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
Ali Shiravi et al.
COMPUTERS & SECURITY (2012)
Anomaly-based network intrusion detection: Techniques, systems and challenges
P. Garcia-Teodoro et al.
COMPUTERS & SECURITY (2009)
Intrusion detection by machine learning: A review
Chih-Fong Tsai et al.
EXPERT SYSTEMS WITH APPLICATIONS (2009)
The 1999 DARPA off-line intrusion detection evaluation
R Lippmann et al.
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING (2000)