2018
DOI: 10.5121/ijnsa.2018.10501
|View full text |Cite
|
Sign up to set email alerts
|

Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions

Abstract: Anomaly-based Intrusion Detection Systems (IDS) have gained increased popularity over time. There are many proposed anomaly-based systems using different Machine Learning (ML) algorithms and techniques, however there is no standard benchmark to compare them based on quantifiable measures. In this paper, we propose a benchmark that measures both accuracy and performance to produce objective metrics that can be used in the evaluation of each algorithm implementation. We then use this benchmark to compare accurac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…In this paper, we propose a novel methodology to compare netflow-based network anomaly detection systems using synthetically generated malicious traffic modeling a propagating computer worm [5]. The novelty of our work lies in the fact that we have used malicious traffic as the focus instead of normal traffic to evaluate NF-NAD systems [6]. For this methodology, we have restricted the malicious traffic to common attacks-distributed denial of service attacks (DDoS) [7] and scanning attacks.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we propose a novel methodology to compare netflow-based network anomaly detection systems using synthetically generated malicious traffic modeling a propagating computer worm [5]. The novelty of our work lies in the fact that we have used malicious traffic as the focus instead of normal traffic to evaluate NF-NAD systems [6]. For this methodology, we have restricted the malicious traffic to common attacks-distributed denial of service attacks (DDoS) [7] and scanning attacks.…”
Section: Introductionmentioning
confidence: 99%