2017
DOI: 10.1016/j.comnet.2017.08.013
|View full text |Cite
|
Sign up to set email alerts
|

Toward a reliable anomaly-based intrusion detection in real-world environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
41
0
1

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 97 publications
(42 citation statements)
references
References 24 publications
0
41
0
1
Order By: Relevance
“…AndShiravi, Tavallaee, and Ghorbani (2012) present a new reference data set (the ISCX data set) for validating network intrusion detection systems is presented where according to Soheily-Khah, Marteau, and Béchet (2017), attack traffic accounts for 2% of the overall traffic only. While 2% is quite low, it might easily be much lower, for example 0.01%, as in the application layer denial-of-service data set of Viegas, Santin, and Oliveira (2017).…”
Section: Anomaly Detectionmentioning
confidence: 99%
“…AndShiravi, Tavallaee, and Ghorbani (2012) present a new reference data set (the ISCX data set) for validating network intrusion detection systems is presented where according to Soheily-Khah, Marteau, and Béchet (2017), attack traffic accounts for 2% of the overall traffic only. While 2% is quite low, it might easily be much lower, for example 0.01%, as in the application layer denial-of-service data set of Viegas, Santin, and Oliveira (2017).…”
Section: Anomaly Detectionmentioning
confidence: 99%
“…backscatter, DoS, exploits, malware, port scans, shellcode) LBNL [61] port scans NDSec-1 [62] botnet (Citadel), brute force (against FTP, HTTP and SSH), DDoS (HTTP floods, SYN flooding and UDP floods), exploits, probe, spoofing, SSL proxy, XSS/SQL injection NGIDS-DS [19] backdoors, DoS, exploits, generic, reconnaissance, shellcode, worms NSL-KDD [63] DoS, privilege escalation (remote-to-local and user-to-root), probing PU-IDS [64] DoS, privilege escalation (remote-to-local and user-to-root), probing PUF [65] DNS attacks SANTA [35] (D)DoS (ICMP flood, RUDY, SYN flood), DNS amplification, heartbleed, port scans SSENET-2011 [47] DoS (executed through LOIC), port scans (executed through Angry IP Scanner, Nessus, Nmap), various attack tools (e.g. metasploit) SSENET-2014 [66] botnet, flooding, privilege escalation, port scans SSHCure [67] SSH attacks TRAbID [68] DoS (HTTP flood, ICMP flood, SMTP flood, SYN flood, TCP keepalive), port scans (ACK-Scan, FIN-Scan, NULL-Scan, OS Fingerprinting, Service Fingerprinting, UDP-Scan, XMAS-Scan) TUIDS [69], [70] botnet (IRC), DDoS (Fraggle flood, Ping flood, RST flood, smurf ICMP flood, SYN flood, UDP flood), port scans (e.g. FIN-Scan, NULL-Scan, UDP-Scan, XMAS-Scan), coordinated port scan, SSH brute force Twente [71] Attacks against a honeypot with three open services (FTP, HTTP, SSH) UGR'16 [29] botnet (Neris), DoS, port scans, SSH brute force, spam UNIBS [72] none Unified Host and Network [73] not specified UNSW-NB15 [20] backdoors, DoS, exploits, fuzzers, generic, port scans, reconnaissance, shellcode, spam, worms traffic, and comes along with a detailed technical report with additional information.…”
Section: Data Setmentioning
confidence: 99%
“…TRAbID [68]. Viegas et al proposed the TRAbID database [68] in 2017. This database contains 16 different scenarios for evaluating IDS.…”
Section: Data Setmentioning
confidence: 99%
“…Intrusion detection based on networks is an important step of cyber security [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15]. By analyzing large amounts of network data, network-based intrusion detection can effectively mitigate security threats [16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34][35]. Therefore, data processing plays a vital role in intrusion detection.…”
Section: Introductionmentioning
confidence: 99%
“…According to different evaluation functions, the filter methods are divided into five categories: distance, information (or uncertainty), dependence, consistency and the classifier error rate [15]. In recent years, many feature selection algorithms have been proposed [16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34][35]. When feature selection is applied properly, it can significantly improve classification processing time and performance.…”
Section: Introductionmentioning
confidence: 99%