메뉴 건너뛰기




Volumn , Issue , 2017, Pages

An Evaluation Framework for Intrusion Detection Dataset

Author keywords

Evaluation Framework; IDS; Intrusion Detection; Intrusion Prevention; IPS

Indexed keywords

BENCHMARKING; MERCURY (METAL); NETWORK SECURITY;

EID: 85018344606     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICISSEC.2016.7885840     Document Type: Conference Paper
Times cited : (197)

References (32)
  • 2
    • 84859430323 scopus 로고    scopus 로고
    • Toward developing a systematic approach to generate benchmark datasets for intrusion detection
    • M. T. Ali Shiravi, Hadi Shiravi and A. A. Ghorbani, "Toward developing a systematic approach to generate benchmark datasets for intrusion detection, " Computers and Security, vol. 31, no. 3, pp. 357-374, 2012.
    • (2012) Computers and Security , vol.31 , Issue.3 , pp. 357-374
    • Ali Shiravi, M.T.1    Shiravi, H.2    Ghorbani, A.A.3
  • 3
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
    • Nov.
    • J. McHugh, "Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory, " ACM Trans. Inf. Syst. Secur., vol. 3, no. 4, pp. 262-294, Nov. 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 5
    • 77950560033 scopus 로고    scopus 로고
    • I. U. University of California [Online]. Available
    • I. U. University of California, "Kdd cup 1999, " 2007. [Online]. Available: Http://kdd. ics. uci. edu/databases/kddcup99/
    • (2007) Kdd Cup 1999
  • 8
    • 85018341223 scopus 로고    scopus 로고
    • [Online]. Available
    • T. S. Group, "Defcon 8, 10 and 11, " 2000. [Online]. Available: Http://cctf. shmoo. com/
    • (2000) Defcon 8, 10 and 11
  • 9
    • 85018345385 scopus 로고    scopus 로고
    • (san jose, ca) [Online]. Available
    • "Caida data set oc48 link a (san jose, ca), " 2002. [Online]. Available: Https://www. caida. org/data/passive/passive oc48 dataset. xml
    • (2002) Caida Data Set oc48 Link a
  • 10
    • 79957908678 scopus 로고    scopus 로고
    • [Online]. Available
    • "Caida ddos attack dataset, " 2007. [Online]. Available: Https://www. caida. org/data/passive/ddos-20070804 dataset. xml
    • (2007) Caida Ddos Attack Dataset
  • 11
  • 14
  • 19
    • 85018288784 scopus 로고    scopus 로고
    • U. of Massachusetts Amherst [Online]. Available
    • U. of Massachusetts Amherst, "Optimistic tcp acking, " 2011. [Online]. Available: Http://traces. cs. umass. edu/
    • (2011) Optimistic TCP Acking
  • 22
    • 84897786599 scopus 로고    scopus 로고
    • Evaluating host-based anomaly detection systems: A preliminary analysis of adfa-ld
    • M. Xie and J. Hu, "Evaluating host-based anomaly detection systems: A preliminary analysis of adfa-ld, " in Image and Signal Processing (CISP), 2013 6th International Congress on, vol. 03, 2013, pp. 1711-1716.
    • (2013) Image and Signal Processing (CISP), 2013 6th International Congress On , vol.3 , pp. 1711-1716
    • Xie, M.1    Hu, J.2
  • 28
    • 84888375268 scopus 로고    scopus 로고
    • An in-depth analysis on traffic flooding attacks detection and system using data mining techniques
    • J. Yu, H. Kang, D. Park, H.-C. Bang, D. W. Kang, "An in-depth analysis on traffic flooding attacks detection and system using data mining techniques, " J. Syst. Archit., vol. 59, no. 10, pp. 1005-1012, 2013.
    • (2013) J. Syst. Archit. , vol.59 , Issue.10 , pp. 1005-1012
    • Yu, J.1    Kang, H.2    Park, D.3    Bang, H.-C.4    Kang, D.W.5
  • 29
    • 0032665796 scopus 로고    scopus 로고
    • Evaluating data mining procedures: Techniques for generating artificial data sets
    • P. Scott and E. Wilkins, "Evaluating data mining procedures: Techniques for generating artificial data sets, " Information and Software Technology, vol. 41, no. 9, pp. 579-587, 1999.
    • (1999) Information and Software Technology , vol.41 , Issue.9 , pp. 579-587
    • Scott, P.1    Wilkins, E.2
  • 32
    • 85018365223 scopus 로고    scopus 로고
    • [Online]. Available
    • "Mcafee threat report, " 2016. [Online]. Available: Http://www. mcafee. com/ca/resources/reports/rp-quarterly-threatsmar-2016
    • (2016) Mcafee Threat Report


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.