How to Effectively Collect and Process Network Data for Intrusion Detection?

The number of security breaches in the cyberspace is on the rise. This threat is met with intensive work in the intrusion detection research community. To keep the defensive mechanisms up to date and relevant, realistic network traffic datasets are needed. The use of flow-based data for machine-lear...

Description complète

Enregistré dans:
Détails bibliographiques
Auteurs principaux: Mikołaj Komisarek, Marek Pawlicki, Rafał Kozik, Witold Hołubowicz, Michał Choraś
Format: article
Langue:EN
Publié: MDPI AG 2021
Sujets:
Q
Accès en ligne:https://doaj.org/article/e9dc1dc7b51440d9be1d59c2133f58f4
Tags: Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!