Flow-based benchmark data sets for intrusion detection
暂无分享,去创建一个
Andreas Hotho | Dieter Landes | Markus Ring | Sarah Wunderlich | Dominik Grüdl | A. Hotho | D. Landes | Markus Ring | Sarah Wunderlich | Dominik Grüdl
[1] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[2] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[3] Taghi M. Khoshgoftaar,et al. A New Intrusion Detection Benchmarking System , 2015, FLAIRS Conference.
[4] Max Mühlhäuser,et al. Towards the creation of synthetic, yet realistic, intrusion detection datasets , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[5] Kensuke Fukuda,et al. MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking , 2010, CoNEXT.
[6] Andreas Hotho,et al. A Toolset for Intrusion and Insider Threat Detection , 2017 .
[7] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[8] Florian Otto. Creation of specific flow-based training data sets for usage behaviour classification , 2016 .
[9] Aiko Pras,et al. A Labeled Data Set for Flow-Based Intrusion Detection , 2009, IPOM.
[10] Dieter Landes,et al. Identifying Suspicious Activities in Company Networks Through Data Mining and Visualization , 2013 .
[11] M. Malowidzki,et al. Network Intrusion Detection : Half a Kingdom for a Good Dataset , 2015 .
[12] Taghi M. Khoshgoftaar,et al. A Session Based Approach for Aggregating Network Traffic Data -- The SANTA Dataset , 2014, 2014 IEEE International Conference on Bioinformatics and Bioengineering.
[13] Jeffrey L. Hieb,et al. Cyber security risk assessment for SCADA and DCS networks. , 2007, ISA transactions.