This paper aims to evaluate CSE-CIC-IDS2018 network intrusions dataset and benchmark a set of supervised bioinspired machine learning algo rithms, namely CLONALG Artificial Immune System, Learning Vector Quantization (LVQ) and Back-Propagation Multi-Layer Perceptron (MLP). The results obtained were also compared with an ensemble strategy based on a majority voting algorithm. The results obtained show the appropri ateness of using the dataset to test behaviour based network intrusion de tection algorithms and the efficiency of MLP algorithm to detect zero-day attacks, when comparing with CLONALG and LVQ.info:eu-repo/semantics/publishedVersio
Generally, Intrusion Detection Systems (IDS) work using two methods of identification of attacks: by...
With the rapid growth of digital technology communications are overwhelmed by network data traffic. ...
With the tremendous growth of the Internet and the continuous increase in malicious attacks on corpo...
This paper describes the process and results of analyzing CICIDS2017, a modern, labeled data set for...
Network security encloses a wide set of technologies dealing with intrusions detection. Despite the ...
The escalation of hazards to safety and hijacking of digital networks are among the strongest perilo...
Our paramount task is to examine and detect network attacks, is one of the daunting tasks because th...
Securing networks and their confidentiality from intrusions is crucial, and for this rea-son, Intrus...
Today, the creation of more effective intrusion detection system (IDS) has become crucial due to the...
This article consolidates analysis of established (NSL-KDD) and new intrusion detection datasets (IS...
Network intrusion detection is a task aimed to identify malicious network traffic. Malicious network...
Current intrusion detection techniques cannot keep up with the increasing amount and complexity of c...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...
Networks are exposed to an increasing number of cyberattacks due to their vulnerabilities. So, cyber...
The use of Machine Learning (ML) techniques in Intrusion Detection Systems (IDS) has taken a promine...
Generally, Intrusion Detection Systems (IDS) work using two methods of identification of attacks: by...
With the rapid growth of digital technology communications are overwhelmed by network data traffic. ...
With the tremendous growth of the Internet and the continuous increase in malicious attacks on corpo...
This paper describes the process and results of analyzing CICIDS2017, a modern, labeled data set for...
Network security encloses a wide set of technologies dealing with intrusions detection. Despite the ...
The escalation of hazards to safety and hijacking of digital networks are among the strongest perilo...
Our paramount task is to examine and detect network attacks, is one of the daunting tasks because th...
Securing networks and their confidentiality from intrusions is crucial, and for this rea-son, Intrus...
Today, the creation of more effective intrusion detection system (IDS) has become crucial due to the...
This article consolidates analysis of established (NSL-KDD) and new intrusion detection datasets (IS...
Network intrusion detection is a task aimed to identify malicious network traffic. Malicious network...
Current intrusion detection techniques cannot keep up with the increasing amount and complexity of c...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...
Networks are exposed to an increasing number of cyberattacks due to their vulnerabilities. So, cyber...
The use of Machine Learning (ML) techniques in Intrusion Detection Systems (IDS) has taken a promine...
Generally, Intrusion Detection Systems (IDS) work using two methods of identification of attacks: by...
With the rapid growth of digital technology communications are overwhelmed by network data traffic. ...
With the tremendous growth of the Internet and the continuous increase in malicious attacks on corpo...