2010
DOI: 10.1007/978-3-642-11530-1_13
|View full text |Cite
|
Sign up to set email alerts
|

A Simple Method for Improving Intrusion Detections in Corporate Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Attacks in DEFCON-10 dataset contains probing and non-probing attacks (e.g., bad packet, ports scan, port sweeps, etc.). Both versions are used by Nehinbe Ojo Joshua [80] for reclassifying network intrusions.…”
Section: Public Datasetsmentioning
confidence: 99%
“…Attacks in DEFCON-10 dataset contains probing and non-probing attacks (e.g., bad packet, ports scan, port sweeps, etc.). Both versions are used by Nehinbe Ojo Joshua [80] for reclassifying network intrusions.…”
Section: Public Datasetsmentioning
confidence: 99%
“…The available public datasets, encompassing a broad spectrum of devices and setups, are classified into seven categories: Internet-connected devices, electrical networks, virtual private networks, Android applications, Internet traffic, IoT traffic, and network traffic. The most prominent of these datasets include DARPA [34], KDDCup99 [54], NSL-KDD [54], Kyoto [52], UNSW-NB15 [41], CIC-IDS2017 [50], CSE-CIC-IDS2018 [50], WSN-DS [11], DEFCON [44], CAIDA [3], CDX [2], CIC DoS [4], ISCX [5], ADFA2013 [1], TON_IoT [40], MAWI [6].…”
Section: Prior Researchmentioning
confidence: 99%
“…This traffic was generated during the Capture the Flag (CTF) competition, and is therefore significantly different from the real world network traffic comprising mainly of attack traffic. This dataset is therefore useful in studying attacks and alert correlation techniques [79,80]. If blended with simulated benign traffic at appropriate levels it could feasibly be used more widely, however the age and skewed event distribution in the dataset makes its utility today extremely limited.…”
Section: Defcon (The Shmoo Group 2000)mentioning
confidence: 99%