Proceedings of the ACM Workshop on Systems and Network Telemetry and Analytics 2019
DOI: 10.1145/3322798.3329251
|View full text |Cite
|
Sign up to set email alerts
|

Generating Labeled Flow Data from MAWILab Traces for Network Intrusion Detection

Abstract: A growing issue in the modern cyberspace world is the direct identification of malicious activity over network connections. The boom of the machine learning industry in the past few years has led to the increasing usage of machine learning technologies, which are especially prevalent in the network intrusion detection research community. When utilizing these fairly contemporary techniques, the community has realized that datasets are pivotal for identifying malicious packets and connections, particularly ones … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…The MAWILab logs contain the attack information collected from multiple intrusion detections systems against the captured packets. In our previous work [38], we combined the captured packet traces with the IDS logs to generate the labeled data for network anomaly detection. A single day trace contains the packets captured in the 15-minute interval, and the number of data points for a day is tens of millions.…”
Section: ) Mawilab Dataset [30]mentioning
confidence: 99%
“…The MAWILab logs contain the attack information collected from multiple intrusion detections systems against the captured packets. In our previous work [38], we combined the captured packet traces with the IDS logs to generate the labeled data for network anomaly detection. A single day trace contains the packets captured in the 15-minute interval, and the number of data points for a day is tens of millions.…”
Section: ) Mawilab Dataset [30]mentioning
confidence: 99%
“…Recently, new solutions to public datasets limitations had been proposed. As an example, new software tools had emerged, such as Silk [19]. The authors proposed a method to produce network traffic datasets for NIDS research by extracting meta-information from the network packets, combined with the logs from a IDS to label the traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Each pcap file is a recording of 15-minute traffic collected on a specific day. A previous study in [15] constructed network data by combining these traffic traces and intrusion logs, but the resulting dataset contains NetFlow-like statistical information made only available at the connection release time. In this work, we construct packet stream data to develop the function for the early identification of network attacks.…”
Section: Packet Stream Data Constructionmentioning
confidence: 99%