Intrusion Detection Systems 2011
DOI: 10.5772/13951
|View full text |Cite
|
Sign up to set email alerts
|

Correlation Analysis Between Honeypot Data and IDS Alerts Using One-class SVM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 34 publications
0
11
0
Order By: Relevance
“…The dataset is based on different attack scenarios. However, it is different from real world network traffic because over 40% of the dataset contains attacks, whereas the ratio of real world attacks is estimated to be approximately 1% [29].…”
Section: A Real Ids Datasetmentioning
confidence: 99%
See 3 more Smart Citations
“…The dataset is based on different attack scenarios. However, it is different from real world network traffic because over 40% of the dataset contains attacks, whereas the ratio of real world attacks is estimated to be approximately 1% [29].…”
Section: A Real Ids Datasetmentioning
confidence: 99%
“…As a result, the following 10 features remained in the ISCX dataset: application name (a1), total source bytes (a2), total destination bytes (a3), total destination packets (a4), total source packets (a5), direction (a6), source TCP flag description (a7), destination TCP flag description (a8), protocol name (a9), and duration (a10). We removed repeated datasets and obtained a dataset (Table 8) with a 1.21% attack rate, which is similar to the ratio of real network communication [29]. Training and testing datasets are formed by the ISCX dataset in the ratios of 60% and 40%, respectively.…”
Section: Preprocessingmentioning
confidence: 99%
See 2 more Smart Citations
“…They were able to identify several types of botnets based on those features. Other authors employed Significant Event Discovery (Buda & Bluemke, 2016), Long-Range Dependency (Zhan & Xu, 2013), Support Vector Machines (Song et al, 2011), Principal Components Analysis (Sharma & Mandeep, 2010;Almotairi, 2009), Symbolic Aggregate Approximation (Thonnard & Dacier, 2008) and feature correlation (Pham & Dacier, 2011). All of them indicate that the forensic examination of honeypot data is executable by standard data mining techniques.…”
Section: Background and Related Workmentioning
confidence: 99%