{"title":"An Extensive Survey on Intrusion Detection Systems: Datasets and Challenges for Modern Scenario","authors":"Vanlalruata Hnamte, J. Hussain","doi":"10.1109/ICECIE52348.2021.9664737","DOIUrl":null,"url":null,"abstract":"Cyberattacks are becoming more and more advanced, making it more difficult to identity suspicious activities on network traffic. Weaponizing the data in the line between network attacks and data breaches continues and the number rises upward even during the recent year with a massive increase in the attack type. Many consider Intrusion Detection System (IDS) datasets publicly available are becoming outdated and inadequate due to the availability of newer attack techniques. Therefore, it is a concern that the extensive usage of these available datasets in the current attack scenario to evaluate IDS models. This paper lists 37 datasets available for testing the IDS models and discusses those publicly accessible datasets, describing the characteristics and limitations for researchers who use such datasets. Finally, based on the dataset characteristics and usage survey, we conclude with a summary of the problems and provide our insights and suggestions for the use of network-based datasets for the Deep Learning approach for further improvement.","PeriodicalId":309754,"journal":{"name":"2021 3rd International Conference on Electrical, Control and Instrumentation Engineering (ICECIE)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 3rd International Conference on Electrical, Control and Instrumentation Engineering (ICECIE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECIE52348.2021.9664737","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Cyberattacks are becoming more and more advanced, making it more difficult to identity suspicious activities on network traffic. Weaponizing the data in the line between network attacks and data breaches continues and the number rises upward even during the recent year with a massive increase in the attack type. Many consider Intrusion Detection System (IDS) datasets publicly available are becoming outdated and inadequate due to the availability of newer attack techniques. Therefore, it is a concern that the extensive usage of these available datasets in the current attack scenario to evaluate IDS models. This paper lists 37 datasets available for testing the IDS models and discusses those publicly accessible datasets, describing the characteristics and limitations for researchers who use such datasets. Finally, based on the dataset characteristics and usage survey, we conclude with a summary of the problems and provide our insights and suggestions for the use of network-based datasets for the Deep Learning approach for further improvement.