2021
DOI: 10.9734/ajrcos/2021/v7i430185
|View full text |Cite
|
Sign up to set email alerts
|

A Detailed Analysis of Benchmark Datasets for Network Intrusion Detection System

Abstract: The enormous increase in the use of the Internet in daily life has provided an opportunity for the intruder attempt to compromise the security principles of availability, confidentiality, and integrity. As a result, organizations are working to increase the level of security by using attack detection techniques such as Network Intrusion Detection System (NIDS), which monitors and analyzes network flow and attacks detection. There are a lot of researches proposed to develop the NIDS and depend on the dataset fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(29 citation statements)
references
References 58 publications
0
19
0
1
Order By: Relevance
“…Classical supervised learning models learn from historical data and continuously need to be retrained to detect new attacks. The limitation of this study is that both datasets are simulated and not realistic Ghurab, Gaphari, Alshamy, Othman and Suad (2021). Many criticisms of the KDD Cup 1999 for example are related the fact that no validation was ever performed to show that the dataset is actually similar to real network traffic Wang, Yang, Jing and Jin (2014).…”
Section: Discussionmentioning
confidence: 99%
“…Classical supervised learning models learn from historical data and continuously need to be retrained to detect new attacks. The limitation of this study is that both datasets are simulated and not realistic Ghurab, Gaphari, Alshamy, Othman and Suad (2021). Many criticisms of the KDD Cup 1999 for example are related the fact that no validation was ever performed to show that the dataset is actually similar to real network traffic Wang, Yang, Jing and Jin (2014).…”
Section: Discussionmentioning
confidence: 99%
“…This three-stage based architecture can increase user trust while filtering out all cloaked dangerous network data by introducing transparency to the decision-making process. CSE-CIC IDS 2018 [214] dataset was utilized to evaluate the performance of the proposed framework and the presented architecture produced accuracy rates of 98.5 percent and 100 percent, respectively on the test dataset and adversarial samples.…”
Section: ) Network Intrusionmentioning
confidence: 99%
“…AIDS is a research and development tool that compares current user activity to established profiles to detect aberrant behaviours that could be intrusions. AIDSs are excellent in detecting network-level attacks, and they are a good approach to spot unknown attacks [14]. Nonetheless, when dealing with the overlap between regular and aberrant traffic patterns, each detection approach has flaws; some shortcomings result in false positives, false negatives, slow networks, and increased CPU utilization [15].…”
Section: Introductionmentioning
confidence: 99%