Proceedings of the 2019 ACM Southeast Conference 2019
DOI: 10.1145/3299815.3314439
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection Using Big Data and Deep Learning Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
63
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 165 publications
(77 citation statements)
references
References 27 publications
0
63
0
2
Order By: Relevance
“…Faker et al [15] evaluated the performance of three classification methods (DNN, RF, and GBT) using Apache Spark on subsets of the selected features from both UNSW-NB15 and CICIDS2017 datasets. Both binary and multi-class attack classifications were used in their study, and they concluded that DNN has the best performance, exhibiting 99.19% accuracy using the UNSW-NB15 dataset and 99.99% accuracy using CICIDS2017.…”
Section: B Applications Of ML Algorithmsmentioning
confidence: 99%
“…Faker et al [15] evaluated the performance of three classification methods (DNN, RF, and GBT) using Apache Spark on subsets of the selected features from both UNSW-NB15 and CICIDS2017 datasets. Both binary and multi-class attack classifications were used in their study, and they concluded that DNN has the best performance, exhibiting 99.19% accuracy using the UNSW-NB15 dataset and 99.99% accuracy using CICIDS2017.…”
Section: B Applications Of ML Algorithmsmentioning
confidence: 99%
“…One was raw PCAP or parsed CSV format, containing network packet level features, and the other was also CSV format, containing network flow level features, which showed the statistic information of many network packets. Out of all the seven works, (Yuan et al 2017;Varenne et al 2019) used packet information as raw inputs, (Yin et al 2017;Ustebay et al 2019;Faker and Dogdu 2019) used flow information as raw inputs, and (Millar et al 2018) explored both cases. Observation 6.3: In order to parse the raw inputs, preprocessing methods, including one-hot vectors for categorical texts, normalization on numeric data, and removal of unused features/data samples, were commonly used.…”
Section: Key Findings From a Closer Lookmentioning
confidence: 99%
“…After preprocessing the raw data, while transformed the data into image representation, (Yuan et al 2017;Varenne et al 2019;Faker and Dogdu 2019;Ustebay et al 2019;Yin et al 2017) directly used the original vectors as an input data. Also, (Millar et al 2018) explored both cases and reported better performance using image representation.…”
Section: Key Findings From a Closer Lookmentioning
confidence: 99%
“…It was created based on B-Profile system [12]. After CIC-2017 released, several studies suggest intrusion detection model using CIC-2017 based on ML [13][14]. CIC-2018 is the most up-to-date dataset including common attacks for IDS evaluation.…”
Section: Introductionmentioning
confidence: 99%
“…CIC-2017 contains network traffic with most common attack families including brute force attacks, heartbleed attacks, botnets, DDOS attacks and web attacks. Faker[13] studies intrusion detection using CIC-2017 and UNSW-NB15 datasets. This study removes socket information to prevent model overfitting.…”
mentioning
confidence: 99%