Most anomaly-based intrusion detectors rely on models that learn from a training dataset whose quality is crucial in their performance. Albeit the properties of suitable datasets have been formulated, the influence of the dataset size on the performance of the anomaly-based detector has received scarce attention so far. In this work, we investigate the optimal size of a training dataset. This size should be large enough so that training data is representative of normal behavior, but after that point, collecting more data may result in unnecessary waste of time and computational resources, not to mention an increased risk of overtraining. In this spirit, we provide a method to find out when the amount of data collected at the producti...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
Although using statistical modeling techniques for detecting anomaly intrusion and profiling user be...
Modern network intrusion detection systems rely on machine learning techniques to detect traffic ano...
Learning-based anomaly detection has proven to be an effective black-box technique for detecting unk...
Network servers are vulnerable to attack, and this state of affairs shows no sign of abating. Theref...
Automated attack tools and the presence of a large number of untrained script kiddies has led to pop...
Detecting intrusion in network traffic has remained a problematic task for years. Progress in the fi...
Recently proposed methods in intrusion detection are iterating on machine learning methods as a pote...
Training neural networks with captured real-world network data may fail to ascertain whether or not ...
Network traffic exhibits a high level of variability over short periods of time. This variability im...
This report describes the results of research into the effects of environment-induced noise on the e...
Intrusion Detection Systems (IDSs) are an important defense tool against the sophisticated and ever-...
Although network intrusion detection systems (IDSs) have been studied for several years, their opera...
Detection methods based on n-gram models have been widely studied for the identication of attacks an...
Nowadays, the majority of corporations mainly use signature-based intrusion detection. This trend is...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
Although using statistical modeling techniques for detecting anomaly intrusion and profiling user be...
Modern network intrusion detection systems rely on machine learning techniques to detect traffic ano...
Learning-based anomaly detection has proven to be an effective black-box technique for detecting unk...
Network servers are vulnerable to attack, and this state of affairs shows no sign of abating. Theref...
Automated attack tools and the presence of a large number of untrained script kiddies has led to pop...
Detecting intrusion in network traffic has remained a problematic task for years. Progress in the fi...
Recently proposed methods in intrusion detection are iterating on machine learning methods as a pote...
Training neural networks with captured real-world network data may fail to ascertain whether or not ...
Network traffic exhibits a high level of variability over short periods of time. This variability im...
This report describes the results of research into the effects of environment-induced noise on the e...
Intrusion Detection Systems (IDSs) are an important defense tool against the sophisticated and ever-...
Although network intrusion detection systems (IDSs) have been studied for several years, their opera...
Detection methods based on n-gram models have been widely studied for the identication of attacks an...
Nowadays, the majority of corporations mainly use signature-based intrusion detection. This trend is...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
Although using statistical modeling techniques for detecting anomaly intrusion and profiling user be...
Modern network intrusion detection systems rely on machine learning techniques to detect traffic ano...