2006
DOI: 10.1007/0-387-33406-8_22
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Known and Novel Network Intrusions

Abstract: Abstract.It is well known that signature based intmsion detection systems are only able to detect known attacks. Unfortunately, current anomaly based intrusion detection systems are also unable to detect all kinds of new attacks because they are designed to restricted applications on limited environment. Current hackers are using new attacks where neither access control systems nor current signature based systems can prevent the devastating results of these attacks against information systems. We enhance the n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
9
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…As reported by Bouzida, one of the attacks in the R2L category (Snmpgetattack), was undistinguishable from the normal network traffic [40]. This was due to the fact that none of the 41 attributes in the datasets was able to differentiate this attack from the normal network traffic.…”
Section: Resultsmentioning
confidence: 90%
“…As reported by Bouzida, one of the attacks in the R2L category (Snmpgetattack), was undistinguishable from the normal network traffic [40]. This was due to the fact that none of the 41 attributes in the datasets was able to differentiate this attack from the normal network traffic.…”
Section: Resultsmentioning
confidence: 90%
“…The KDD dataset has been found to have a number of drawbacks [8], [9]. Thus the testing results do not reflect the behaviour of the algorithm in a real-world environment.…”
Section: Initial Testing and Resultsmentioning
confidence: 99%
“…This occurs partially due to the known drawback of the dataset, i.e. the dataset is proven to possess connections with absolutely the same or very similar feature values, but with different labels [8]. However, all the drawbacks are expected to be mitigated through the influence of the security expert.…”
Section: Initial Testing and Resultsmentioning
confidence: 99%
“…normal and intrusive data, which has become a common approach when adopting machine learning techniques [7,8,22,69,76,87].…”
mentioning
confidence: 99%
“…This paper focuses on the KDD Cup '99 data set, which, as discussed in the Section 2, does not inherit all of the issues with the DARPA data, although it has introduced additional methodological factors that affect the results [7,8,77]. Due to the ready availability of the KDD Cup '99 data set, it is straightforward to evaluate machine learning algorithms for intrusion detection, since no preprocessing of raw data is necessary to extract usable feature vectors.…”
mentioning
confidence: 99%