Proceedings of the XIV Brazilian Symposium on Information Systems 2018
DOI: 10.1145/3229345.3229394
|View full text |Cite
|
Sign up to set email alerts
|

Qualitative evaluation of denial of service datasets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…As noted by both Behal et al [6] and Camargo et al [20], most of the publicly available datasets -such as DARPA 1999 [21] or CAIDA 2007 [22] -are either outdated or lack the features essential for developing detection tools. Until now, we are not aware of a comparative study of the usability of the datasets in the literature to detect DDoS attacks against CSP infrastructures.…”
Section: Datasets Selectionmentioning
confidence: 99%
“…As noted by both Behal et al [6] and Camargo et al [20], most of the publicly available datasets -such as DARPA 1999 [21] or CAIDA 2007 [22] -are either outdated or lack the features essential for developing detection tools. Until now, we are not aware of a comparative study of the usability of the datasets in the literature to detect DDoS attacks against CSP infrastructures.…”
Section: Datasets Selectionmentioning
confidence: 99%
“…The classification process used random tree and the accuracy by bagging was highest among the other methods at the test phase. There are several research works in this domain that used, NSL-KDD and UNSW-NB15 datasets either separately [7][8][9][10][11] or together for comparative analysis [12][13][14][15][16][17]. A partial list of where these two datasets and their predecessors were used was presented in [17].…”
Section: Machine Learning and Cybersecuritymentioning
confidence: 99%