International audienceAcquiring a representative labelled dataset is a hurdle that has to be overcome to learn a supervised detection model. Labelling a dataset is particularly expensive in computer security as expert knowledge is required to perform the annotations. In this paper, we introduce ILAB, a novel interactive labelling strategy that helps experts label large datasets for intrusion detection with a reduced workload. First, we compare ILAB with two state-of-the-art labelling strategies on public labelled datasets and demonstrate it is both an effective and a scalable solution. Second, we show ILAB is workable with a real-world annotation project carried out on a large unlabelled NetFlow dataset originating from a production environ...
This thesis presents our work concerning the design and implements intrusion detection systems using...
An intrusion detection system (IDS) is an important tool to prevent potential threats to systems and...
With the development of information communication technologies (ICT), more and more data is generate...
International audienceLabelling a dataset for supervised learning is particularly expensive in compu...
The overall objective of this thesis is to foster the deployment of supervised learning in detection...
A major problem in cybersecurity research is the correct labeling of up-to-date datasets. It relies ...
Intrusion detection systems (IDSs) have been studied widely in the computer security community for a...
Correctly labelled datasets are commonly required. Three particular scenarios are highlighted, which...
A major problem in cybersecurity research is the correct labeling of up-to-date datasets. It relies ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
This article consolidates analysis of established (NSL-KDD) and new intrusion detection datasets (IS...
One of the reasons that the deployment of network intrusion detection methods falls short is the lac...
Intrusion Detection Systems (IDSs) have become an important part of operational computer security. T...
This paper demonstrates how different machine learning techniques performed on a recent, partially l...
International audienceIntrusion Detection Systems (IDSs) play a vital role in the modern cyber-secur...
This thesis presents our work concerning the design and implements intrusion detection systems using...
An intrusion detection system (IDS) is an important tool to prevent potential threats to systems and...
With the development of information communication technologies (ICT), more and more data is generate...
International audienceLabelling a dataset for supervised learning is particularly expensive in compu...
The overall objective of this thesis is to foster the deployment of supervised learning in detection...
A major problem in cybersecurity research is the correct labeling of up-to-date datasets. It relies ...
Intrusion detection systems (IDSs) have been studied widely in the computer security community for a...
Correctly labelled datasets are commonly required. Three particular scenarios are highlighted, which...
A major problem in cybersecurity research is the correct labeling of up-to-date datasets. It relies ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
This article consolidates analysis of established (NSL-KDD) and new intrusion detection datasets (IS...
One of the reasons that the deployment of network intrusion detection methods falls short is the lac...
Intrusion Detection Systems (IDSs) have become an important part of operational computer security. T...
This paper demonstrates how different machine learning techniques performed on a recent, partially l...
International audienceIntrusion Detection Systems (IDSs) play a vital role in the modern cyber-secur...
This thesis presents our work concerning the design and implements intrusion detection systems using...
An intrusion detection system (IDS) is an important tool to prevent potential threats to systems and...
With the development of information communication technologies (ICT), more and more data is generate...