메뉴 건너뛰기




Volumn , Issue , 2011, Pages 92-97

A critical evaluation of datasets for investigating IDSs and IPSs researches

Author keywords

datasets; IDS; intrusion; IPS

Indexed keywords

CRITICAL EVALUATION; DATA SETS; IDS; INTRUSION; INTRUSION DETECTION AND PREVENTION; INTRUSION DETECTION AND PREVENTION SYSTEMS; INTRUSION DETECTION SYSTEMS; INTRUSION PREVENTION SYSTEMS; IPS; RESEARCH COMMUNITIES; RESEARCH DESIGNS; SECURITY ISSUES;

EID: 84859949988     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIS.2011.6169141     Document Type: Conference Paper
Times cited : (49)

References (23)
  • 3
    • 84859995824 scopus 로고    scopus 로고
    • A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS
    • UK
    • W.B. Buchanan., F. Flandrin., R. Macfarlane and J.A. Graves. "A Methodology to Evaluate Rate-Based Intrusion Prevention System against Distributed Denial-of-Service (DDoS)", In Cyberforensics 2011, UK
    • (2011) Cyberforensics.
    • Buchanan, W.B.1    Flandrin, F.2    Macfarlane, R.3    Graves, J.A.4
  • 4
    • 84860009491 scopus 로고    scopus 로고
    • CTFC (Capture the flag contest) defcon datasets, Accessed 09 January 2011
    • CTFC (Capture the flag contest) defcon datasets, http://cctf.shmoo.com/ data/, Accessed 09 January 2011.
  • 5
    • 84859995826 scopus 로고    scopus 로고
    • CAIDA datasets, Accessed 13 March 2011
    • CAIDA datasets http://www.caida.org/data/statistics/all-data.xml, Accessed 13 March 2011
  • 6
    • 84859995827 scopus 로고    scopus 로고
    • DARPA Intrusion Detection Scenario Specific Datasets, Accessed 20 April 2011
    • DARPA Intrusion Detection Scenario Specific Datasets http://www.ll.mit. edu/mission/communications/ist/corpora/ideval/d ata/index.html, Accessed 20 April 2011
  • 10
    • 84859964883 scopus 로고    scopus 로고
    • KDD-98 datasets, Accessed 20 April 2011
    • KDD-98 datasets http://kdd.ics.uci.edu/databases/kddcup98/kddcup98.html, Accessed 20 April 2011
  • 11
    • 84859964881 scopus 로고    scopus 로고
    • KDD, 1999 datasets, Accessed 20 April 2011
    • KDD 1999 datasets http://www.sigkdd.org/kddcup/index.php?section= 1999&method=data, Accessed 20 April 2011
  • 12
    • 84859994442 scopus 로고    scopus 로고
    • NSL-dataset, Accessed 20 April 2011
    • NSL-dataset http://iscx.ca/NSL-KDD/, Accessed 20 April 2011
  • 13
    • 84859994441 scopus 로고    scopus 로고
    • LBNL/ICSI, Accessed 20 April 2011
    • LBNL/ICSI http://www.icir.org/enterprise-tracing/, Accessed 20 April 2011
  • 14
    • 79957969805 scopus 로고    scopus 로고
    • Feature reduction using principal component analysis for effective anomaly-based intrusion detection on NSL-KDD
    • S. Lakhina, S. Joseph and B. Verma. "Feature Reduction using Principal Component Analysis for Effective Anomaly-Based Intrusion Detection on NSL-KDD", International Journal of Engineering Science and Technology, Vol. 2, pp. 1790-1799, 2010
    • (2010) International Journal of Engineering Science and Technology , vol.2 , pp. 1790-1799
    • Lakhina, S.1    Joseph, S.2    Verma, B.3
  • 15
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A Critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
    • J. McHugh. "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory", ACM Transactions on Information and System Security, Vol. 3, pp. 262-294, 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , pp. 262-294
    • McHugh, J.1
  • 20
    • 84860009496 scopus 로고    scopus 로고
    • SLINGbot, Accessed 20 April 2011
    • SLINGbot http://www.botnetworks.com/, Accessed 20 April 2011
  • 21
    • 0032665796 scopus 로고    scopus 로고
    • Evaluating data mining procedures: Techniques for generating artificial data sets
    • P.D. Scott and E. Wilkins. Evaluating data mining procedures: Techniques for generating artificial data sets, Information and Software Technology, Vol. 41, pp. 579-587, 1999
    • (1999) Information and Software Technology , vol.41 , pp. 579-587
    • Scott, P.D.1    Wilkins, E.2
  • 23
    • 84860009495 scopus 로고    scopus 로고
    • Umass. Network traces, Accessed 20 April 2011
    • Umass. Network traces http://traces.cs.umass.edu//, Accessed 20 April 2011


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.