Cybersecurity attacks: Which dataset should be used to evaluate an intrusion detection system?
Introduction: Analyzing the high-dimensional datasets used for intrusion detection becomes a challenge for researchers. This paper presents the most often used data sets. ADFA contains two data sets containing records from Linux/Unix. AWID is based on actual traces of normal and intrusion activity o...
Main Authors: | Danijela D. Protić, Miomir M. Stanković |
---|---|
Format: | Article |
Language: | English |
Published: |
University of Defence in Belgrade
2023-10-01
|
Series: | Vojnotehnički Glasnik |
Subjects: | |
Online Access: | https://scindeks.ceon.rs/article.aspx?artid=0042-84692304970P |
Similar Items
-
Tier-Based Optimization for Synthesized Network Intrusion Detection System
by: Murtaza Ahmed Siddiqi, et al.
Published: (2022-01-01) -
Investigating Generalized Performance of Data-Constrained Supervised Machine Learning Models on Novel, Related Samples in Intrusion Detection
by: Laurens D’hooge, et al.
Published: (2023-02-01) -
Study on Network Intrusion Detection Method Using Discrete Pre-Processing Method and Convolution Neural Network
by: Jihoon Yoo, et al.
Published: (2021-01-01) -
Performance Analysis of Feature Subset Selection Techniques for Intrusion Detection
by: Yousef Almaghthawi, et al.
Published: (2022-12-01) -
Review of KDD Cup ‘99, NSL-KDD and Kyoto 2006+ datasets / Обзор KDD Cup ‘99, NSL-KDD и Kyoto 2006+ баз данных / Pregled KDD Cup '99, NSL-KDD i Kyoto 2006+ baza podataka
by: Danijela D. Protić
Published: (2018-07-01)