2016
DOI: 10.1109/tla.2016.7430108
|View full text |Cite
|
Sign up to set email alerts
|

The Development and Evaluation of a Dataset for Testing of IDS for Wireless Networks

Abstract: This paper originates from research that investigated about the creation of the dataset representative of a wireless computer network. The proposal was intended to generate the dataset from network traffic of a real wireless network to be employed in the evaluation of Intrusion Detection Systems-IDS. Several attacks were granted against the network in order to obtain data from these anomalous behaviors. The methodological procedures performed involved the capture of the traffic on the wireless network and it's… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…As a result, the ISMS was implemented in the company, considering the particularities of its business. Ferreira and Shinoda [61] evaluated an Intrusion Detection System (IDS) in a typical wi-fi network. Mukhanov et al [59] consider the possible use of PP for avoiding new classes of network attacks on SDN switches and controllers, which can involve data and control components because of the isolation of the controller from the circulation of messages in the control plane.…”
Section: B Information Security and The Common Criteria Standardmentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, the ISMS was implemented in the company, considering the particularities of its business. Ferreira and Shinoda [61] evaluated an Intrusion Detection System (IDS) in a typical wi-fi network. Mukhanov et al [59] consider the possible use of PP for avoiding new classes of network attacks on SDN switches and controllers, which can involve data and control components because of the isolation of the controller from the circulation of messages in the control plane.…”
Section: B Information Security and The Common Criteria Standardmentioning
confidence: 99%
“…The discussion about information security in scientific literature shows a search for the foundation of cybersecurity systems and an effort to develop tools and methodologies for product homologation [12,13,14,18,21,22,23,24,77]. Moreover, national systems and private companies have invested in such an effort as they could and should be expected to do [19,66,61]. A similar effort is in course in the Brazilian Government, as already mentioned [2,4].…”
Section: Summary and Decision About Information Security Standardsmentioning
confidence: 99%