Generating Labeled Flow Data from MAWILab Traces for Network Intrusion Detection
暂无分享,去创建一个
[1] Jinoh Kim,et al. An approach to online network monitoring using clustered patterns , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).
[2] Kensuke Fukuda,et al. A taxonomy of anomalies in backbone network traffic , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).
[3] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[4] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[5] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[6] Christian Callegari,et al. Statistical Network Anomaly Detection: An Experimental Study , 2016, FNSS.
[7] Kensuke Fukuda,et al. Visual comparison of network anomaly detectors with chord diagrams , 2014, SAC.
[8] Mohiuddin Ahmed,et al. A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..
[9] EMMANOUIL VASILOMANOLAKIS,et al. Taxonomy and Survey of Collaborative Intrusion Detection , 2015, ACM Comput. Surv..
[10] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[11] Kensuke Fukuda,et al. MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking , 2010, CoNEXT.