2010
DOI: 10.1007/978-3-642-11530-1_13
|View full text |Cite
|
Sign up to set email alerts
|

A Simple Method for Improving Intrusion Detections in Corporate Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Attacks in DEFCON-10 dataset contains probing and non-probing attacks (e.g., bad packet, ports scan, port sweeps, etc.). Both versions are used by Nehinbe Ojo Joshua [80] for reclassifying network intrusions.…”
Section: Public Datasetsmentioning
confidence: 99%
“…Attacks in DEFCON-10 dataset contains probing and non-probing attacks (e.g., bad packet, ports scan, port sweeps, etc.). Both versions are used by Nehinbe Ojo Joshua [80] for reclassifying network intrusions.…”
Section: Public Datasetsmentioning
confidence: 99%
“…This traffic was generated during the Capture the Flag (CTF) competition, and is therefore significantly different from the real world network traffic comprising mainly of attack traffic. This dataset is therefore useful in studying attacks and alert correlation techniques [79,80]. If blended with simulated benign traffic at appropriate levels it could feasibly be used more widely, however the age and skewed event distribution in the dataset makes its utility today extremely limited.…”
Section: Defcon (The Shmoo Group 2000)mentioning
confidence: 99%
“…The traffic produced during CTF is very different from real world network traffic since it contains mostly intrusive traffic without any normal background traffic. Due to this limitation, DEFCON dataset has been found useful only in evaluating alert correlation techniques [43].…”
Section: Defcon Datasets (2002)mentioning
confidence: 99%