Note that there are some explanatory texts on larger screens.

plurals
  1. PO
    primarykey
    data
    text
    <p>I study in the same subject. Intrusion detection and machine learning. It is rather broad subject. I will answer more about data pre-processing and feature construction point of view. Neural Network part is different story altogether.</p> <p>First of all, this area is heavily commercialized therefore there is almost no open source code examples. A lot things are done commercially in a closed ecosystem.</p> <p>From academic perspective: There is a big data set problem. DK99C (Darpa - KDD99 data set) exists but it is very old. KDD99 dataset is constructed from DARPA tcpdumps. They used bro IDS , tcpdump api to construct features. From my perspective it is a lot harder to create features from raw tcpdump than working with machine learning algorithms (Neural Network) on ready features.</p> <p>Read this article to learn more about how it (KDD99) is constructed</p> <pre><code>Article (Lee2000framework) Lee, W. &amp; Stolfo, S. J. A framework for constructing features and models for intrusion detection systems ACM Trans. Inf. Syst. Secur., ACM, 2000, 3, 227-261 </code></pre> <p>Read this article and its presentation to learn why this subject is a hard problem to study.</p> <pre><code> Inproceedings (Sommer2010Outside) Sommer, R. &amp; Paxson, V. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection Proceedings of the 2010 IEEE Symposium on Security and Privacy, IEEE Computer Society, 2010, 305-316 </code></pre> <p>Read this article to see how most academics work in this subject. A bit disappointing really.</p> <pre><code>Article (Tavallaee2010Toward) Tavallaee, M.; Stakhanova, N. &amp; Ghorbani, A. Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 2010, 40, 516 -524 </code></pre> <p>Read this why DK99C is considered harmful. It is harmful but no other credible dataset exists.</p> <pre><code>Article (Brugger2007KDD) Brugger, S. KDD Cup’99 dataset (Network Intrusion) considered harmful KDnuggets newsletter, 2007, 7, 15 </code></pre> <p>Read this about taxonomy of IDS data pre processing</p> <pre><code>Article (Davis2011Data) Davis, J. J. &amp; Clark, A. J. Data preprocessing for anomaly based network intrusion detection: A review Computers &amp; Security, 2011, 30, 353 - 375 </code></pre>
    singulars
    1. This table or related slice is empty.
    plurals
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. VO
      singulars
      1. This table or related slice is empty.
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload