How to Effectively Collect and Process Network Data for Intrusion Detection?
The number of security breaches in the cyberspace is on the rise. This threat is met with intensive work in the intrusion detection research community. To keep the defensive mechanisms up to date and relevant, realistic network traffic datasets are needed. The use of flow-based data for machine-lear...
Main Authors: | Mikołaj Komisarek, Marek Pawlicki, Rafał Kozik, Witold Hołubowicz, Michał Choraś |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-11-01
|
Series: | Entropy |
Subjects: | |
Online Access: | https://www.mdpi.com/1099-4300/23/11/1532 |
Similar Items
-
Utilising Flow Aggregation to Classify Benign Imitating Attacks
by: Hanan Hindy, et al.
Published: (2021-03-01) -
Tackling Evolving Botnet Threats: A Gradual Self-Training Neural Network Approach
by: Ta-Chun Lo, et al.
Published: (2024-01-01) -
Towards Zero-Shot Flow-Based Cyber-Security Anomaly Detection Framework
by: Mikołaj Komisarek, et al.
Published: (2022-09-01) -
A Large Scale NetFlow Analysis System Based on Spark
by: Shengyong Ding, et al.
Published: (2014-10-01) -
A Large Scale NetFlow Analysis System Based on Spark
by: Shengyong Ding, et al.
Published: (2014-10-01)