A Systematic Hands-On Approach to Generate Real-Life Intrusion Datasets

  • Bhuyan M
  • Bhattacharyya D
  • Kalita J
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To evaluate a network anomaly detection or prevention, it is essential to test using benchmark network traffic datasets. This chapter aims to provide a systematic hands-on approach to generate real-life intrusion dataset. It is organized in three major sections. Section 3.1 provides the basic concepts. Section 3.2 introduces several benchmark and real-life datasets. Finally, Sect.{\thinspace}3.3 provides a systematic approach toward generation of an unbiased real-life intrusion datasets. We establish the importance of intrusion datasets in the development and validation of a detection mechanism or a system, identify a set of requirements for effective dataset generation, and discuss several attack scenarios.

Cite

CITATION STYLE

APA

Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2017). A Systematic Hands-On Approach to Generate Real-Life Intrusion Datasets (pp. 71–114). https://doi.org/10.1007/978-3-319-65188-0_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free