-
2
-
-
84859430323
-
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
-
M. T. Ali Shiravi, Hadi Shiravi and A. A. Ghorbani, "Toward developing a systematic approach to generate benchmark datasets for intrusion detection, " Computers and Security, vol. 31, no. 3, pp. 357-374, 2012.
-
(2012)
Computers and Security
, vol.31
, Issue.3
, pp. 357-374
-
-
Ali Shiravi, M.T.1
Shiravi, H.2
Ghorbani, A.A.3
-
3
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
-
Nov.
-
J. McHugh, "Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory, " ACM Trans. Inf. Syst. Secur., vol. 3, no. 4, pp. 262-294, Nov. 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
4
-
-
77950566663
-
Analysis of the 1999 DARPA/lincoln laboratory ids evaluation data with netadhict
-
July
-
C. Brown, A. Cowperthwaite, A. Hijazi, A. Somayaji, "Analysis of the 1999 darpa/lincoln laboratory ids evaluation data with netadhict, " in 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, July 2009, pp. 1-7.
-
(2009)
2009 IEEE Symposium On Computational Intelligence for Security and Defense Applications
, pp. 1-7
-
-
Brown, C.1
Cowperthwaite, A.2
Hijazi, A.3
Somayaji, A.4
-
5
-
-
77950560033
-
-
I. U. University of California [Online]. Available
-
I. U. University of California, "Kdd cup 1999, " 2007. [Online]. Available: Http://kdd. ics. uci. edu/databases/kddcup99/
-
(2007)
Kdd Cup 1999
-
-
-
6
-
-
77950575061
-
A detailed analysis of the kdd cup 99 data set
-
July
-
M. Tavallaee, E. Bagheri, W. Lu, A. A. Ghorbani, "A detailed analysis of the kdd cup 99 data set, " in 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, July 2009, pp. 1-6.
-
(2009)
2009 IEEE Symposium On Computational Intelligence for Security and Defense Applications
, pp. 1-6
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.A.4
-
8
-
-
85018341223
-
-
[Online]. Available
-
T. S. Group, "Defcon 8, 10 and 11, " 2000. [Online]. Available: Http://cctf. shmoo. com/
-
(2000)
Defcon 8, 10 and 11
-
-
-
9
-
-
85018345385
-
-
(san jose, ca) [Online]. Available
-
"Caida data set oc48 link a (san jose, ca), " 2002. [Online]. Available: Https://www. caida. org/data/passive/passive oc48 dataset. xml
-
(2002)
Caida Data Set oc48 Link a
-
-
-
10
-
-
79957908678
-
-
[Online]. Available
-
"Caida ddos attack dataset, " 2007. [Online]. Available: Https://www. caida. org/data/passive/ddos-20070804 dataset. xml
-
(2007)
Caida Ddos Attack Dataset
-
-
-
12
-
-
85018264130
-
-
Master's thesis, University of California DAVIS, CA, USA
-
E. P. Proebstel, "Characterizing and improving distributed networkbased intrusion detection systems(nids):timestamp synchronization and sampled traffic, " Master's thesis, University of California DAVIS, CA, USA, 2008.
-
(2008)
Characterizing and Improving Distributed Networkbased Intrusion Detection Systems(nids):timestamp Synchronization and Sampled Traffic
-
-
Proebstel, E.P.1
-
15
-
-
79958715723
-
Statistical analysis of honeypot data and building of kyoto 2006+ dataset for nids evaluation
-
J. Song, H. Takakura, Y. Okabe, M. Eto, D. Inoue, K. Nakao, "Statistical analysis of honeypot data and building of kyoto 2006+ dataset for nids evaluation, " in Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. ACM, 2011, pp. 29-36.
-
(2011)
Proceedings of the First Workshop On Building Analysis Datasets and Gathering Experience Returns for Security. ACM
, pp. 29-36
-
-
Song, J.1
Takakura, H.2
Okabe, Y.3
Eto, M.4
Inoue, D.5
Nakao, K.6
-
18
-
-
77049103625
-
A labeled data set for flowbased intrusion detection
-
A. Sperotto, R. Sadre, F. Vliet, A. Pras, "A labeled data set for flowbased intrusion detection, " in Proceedings of the 9th IEEE International Workshop on IP Operations and Management IPOM09, 2009, pp. 39-50.
-
(2009)
Proceedings of the 9th IEEE International Workshop On IP Operations and Management IPOM09
, pp. 39-50
-
-
Sperotto, A.1
Sadre, R.2
Vliet, F.3
Pras, A.4
-
19
-
-
85018288784
-
-
U. of Massachusetts Amherst [Online]. Available
-
U. of Massachusetts Amherst, "Optimistic tcp acking, " 2011. [Online]. Available: Http://traces. cs. umass. edu/
-
(2011)
Optimistic TCP Acking
-
-
-
22
-
-
84897786599
-
Evaluating host-based anomaly detection systems: A preliminary analysis of adfa-ld
-
M. Xie and J. Hu, "Evaluating host-based anomaly detection systems: A preliminary analysis of adfa-ld, " in Image and Signal Processing (CISP), 2013 6th International Congress on, vol. 03, 2013, pp. 1711-1716.
-
(2013)
Image and Signal Processing (CISP), 2013 6th International Congress On
, vol.3
, pp. 1711-1716
-
-
Xie, M.1
Hu, J.2
-
23
-
-
84920599396
-
Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to adfa-ld
-
M. Xie, J. Hu, J. Slay, "Evaluating host-based anomaly detection systems: Application of the one-class svm algorithm to adfa-ld, " in 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2014, pp. 978-982.
-
(2014)
2014 11th International Conference On Fuzzy Systems and Knowledge Discovery (FSKD)
, pp. 978-982
-
-
Xie, M.1
Hu, J.2
Slay, J.3
-
26
-
-
66249128606
-
How to test dos defenses
-
March
-
J. Mirkovic, S. Fahmy, P. Reiher, R. K. Thomas, "How to test dos defenses, " in Conference For Homeland Security, 2009. CATCH '09. Cybersecurity Applications Technology, March 2009, pp. 103-117.
-
(2009)
Conference for Homeland Security 2009. CATCH '09. Cybersecurity Applications Technology
, pp. 103-117
-
-
Mirkovic, J.1
Fahmy, S.2
Reiher, P.3
Thomas, R.K.4
-
27
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours) why size estimates remain challenging
-
M. A. Rajab, J. Zarfoss, F. Monrose, A. Terzis, "My botnet is bigger than yours (maybe, better than yours) why size estimates remain challenging, " in Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets. USENIX Association, 2007, pp. 5-5.
-
(2007)
Proceedings of the First Conference On First Workshop On Hot Topics in Understanding Botnets. USENIX Association
, pp. 5
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
28
-
-
84888375268
-
An in-depth analysis on traffic flooding attacks detection and system using data mining techniques
-
J. Yu, H. Kang, D. Park, H.-C. Bang, D. W. Kang, "An in-depth analysis on traffic flooding attacks detection and system using data mining techniques, " J. Syst. Archit., vol. 59, no. 10, pp. 1005-1012, 2013.
-
(2013)
J. Syst. Archit.
, vol.59
, Issue.10
, pp. 1005-1012
-
-
Yu, J.1
Kang, H.2
Park, D.3
Bang, H.-C.4
Kang, D.W.5
-
29
-
-
0032665796
-
Evaluating data mining procedures: Techniques for generating artificial data sets
-
P. Scott and E. Wilkins, "Evaluating data mining procedures: Techniques for generating artificial data sets, " Information and Software Technology, vol. 41, no. 9, pp. 579-587, 1999.
-
(1999)
Information and Software Technology
, vol.41
, Issue.9
, pp. 579-587
-
-
Scott, P.1
Wilkins, E.2
-
32
-
-
85018365223
-
-
[Online]. Available
-
"Mcafee threat report, " 2016. [Online]. Available: Http://www. mcafee. com/ca/resources/reports/rp-quarterly-threatsmar-2016
-
(2016)
Mcafee Threat Report
-
-
|