Cargando…

How to Effectively Collect and Process Network Data for Intrusion Detection?

The number of security breaches in the cyberspace is on the rise. This threat is met with intensive work in the intrusion detection research community. To keep the defensive mechanisms up to date and relevant, realistic network traffic datasets are needed. The use of flow-based data for machine-lear...

Descripción completa

Detalles Bibliográficos
Autores principales: Komisarek, Mikołaj, Pawlicki, Marek, Kozik, Rafał, Hołubowicz, Witold, Choraś, Michał
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8619486/
https://www.ncbi.nlm.nih.gov/pubmed/34828230
http://dx.doi.org/10.3390/e23111532