2021 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW) 2021
DOI: 10.1109/icce-tw52618.2021.9602909
|View full text |Cite
|
Sign up to set email alerts
|

ZYELL-NCTU NetTraffic-1.0: A Large-Scale Dataset for Real-World Network Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…Figure (1) illustrate the analysis of attack types within the dataset (KDD99). (1) The main steps of the proposed system are summarized as follows:…”
Section: The Types Of Network Attack Arementioning
confidence: 99%
See 2 more Smart Citations
“…Figure (1) illustrate the analysis of attack types within the dataset (KDD99). (1) The main steps of the proposed system are summarized as follows:…”
Section: The Types Of Network Attack Arementioning
confidence: 99%
“…The issue of network security has become increasingly significant due to the exponential rise of computer network usage and the proliferation of billions of applications operating within this framework. Irrespective of individual or organizational users, contemporary hackers have identified more avenues to exploit vital information [1]. Hence, the reliable detection of assaults and anomalies in networks becomes increasingly crucial for intrusion detection systems (IDSs).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [19], the researchers created a detection and prevention system for DDoS attacks based on a multiple-layer approach for an IoT-based environment. The detection of attacks can be performed online (cloud layer) or offline.…”
Section: Related Workmentioning
confidence: 99%
“…There are multiple computer programs that can perform ping floods, such as hping3, Tribe Flood Network 2k edition (TFN2K), and Scapy [16]- [19]. However, this work presents an attack program for embedded systems.…”
mentioning
confidence: 99%