How to Effectively Collect and Process Network Data for Intrusion Detection?
The number of security breaches in the cyberspace is on the rise. This threat is met with intensive work in the intrusion detection research community. To keep the defensive mechanisms up to date and relevant, realistic network traffic datasets are needed. The use of flow-based data for machine-lear...
Guardado en:
Autores principales: | Mikołaj Komisarek, Marek Pawlicki, Rafał Kozik, Witold Hołubowicz, Michał Choraś |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
MDPI AG
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/e9dc1dc7b51440d9be1d59c2133f58f4 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Ejemplares similares
-
Designing the collective non-local responses of metasurfaces
por: James R. Capers, et al.
Publicado: (2021) -
A Fast Intrusion Detection Method for High-Speed Railway Clearance Based on Low-Cost Embedded GPUs
por: Yao Wang, et al.
Publicado: (2021) -
Massively-multiplexed generation of Bell-type entanglement using a quantum memory
por: Michał Lipka, et al.
Publicado: (2021) -
Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System
por: Muhammad Nadeem, et al.
Publicado: (2021) -
Trustworthy Intrusion Detection in E-Healthcare Systems
por: Faiza Akram, et al.
Publicado: (2021)