Diego Fernández, Laura Vigoya, Fidel Cacheda, F. J. Nóvoa, Manuel F. López-Vizcaíno, V. Carneiro
{"title":"数据集分析在入侵检测系统中的实际应用","authors":"Diego Fernández, Laura Vigoya, Fidel Cacheda, F. J. Nóvoa, Manuel F. López-Vizcaíno, V. Carneiro","doi":"10.1109/NCA.2018.8548316","DOIUrl":null,"url":null,"abstract":"In this paper a systematic analysis of a public intrusion detection dataset has been developed in order to understand how the traffic behaves in this particular context. This analysis is used for avoiding common pitfalls introduced because of a misunderstanding of data peculiarities and for selecting and tailoring correctly the algorithms. Specifically, we have employed machine learning algorithms to classify the traffic into normal and attack flows. In addition, it is important to decide what features should be evaluated. Typically, standard metrics do not take into account time spent in the classification, what is essential in an intrusion detection system. This is the reason why we introduce a metric that considers both the accuracy and the delay to make the decision and that is employed for evaluating machine learning algorithms in other domains. The conclusions obtained from our dataset analysis can be used to develop new models that could fit the data better than existing approaches.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"135 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A Practical Application of a Dataset Analysis in an Intrusion Detection System\",\"authors\":\"Diego Fernández, Laura Vigoya, Fidel Cacheda, F. J. Nóvoa, Manuel F. López-Vizcaíno, V. Carneiro\",\"doi\":\"10.1109/NCA.2018.8548316\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper a systematic analysis of a public intrusion detection dataset has been developed in order to understand how the traffic behaves in this particular context. This analysis is used for avoiding common pitfalls introduced because of a misunderstanding of data peculiarities and for selecting and tailoring correctly the algorithms. Specifically, we have employed machine learning algorithms to classify the traffic into normal and attack flows. In addition, it is important to decide what features should be evaluated. Typically, standard metrics do not take into account time spent in the classification, what is essential in an intrusion detection system. This is the reason why we introduce a metric that considers both the accuracy and the delay to make the decision and that is employed for evaluating machine learning algorithms in other domains. The conclusions obtained from our dataset analysis can be used to develop new models that could fit the data better than existing approaches.\",\"PeriodicalId\":268662,\"journal\":{\"name\":\"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)\",\"volume\":\"135 5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCA.2018.8548316\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCA.2018.8548316","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Practical Application of a Dataset Analysis in an Intrusion Detection System
In this paper a systematic analysis of a public intrusion detection dataset has been developed in order to understand how the traffic behaves in this particular context. This analysis is used for avoiding common pitfalls introduced because of a misunderstanding of data peculiarities and for selecting and tailoring correctly the algorithms. Specifically, we have employed machine learning algorithms to classify the traffic into normal and attack flows. In addition, it is important to decide what features should be evaluated. Typically, standard metrics do not take into account time spent in the classification, what is essential in an intrusion detection system. This is the reason why we introduce a metric that considers both the accuracy and the delay to make the decision and that is employed for evaluating machine learning algorithms in other domains. The conclusions obtained from our dataset analysis can be used to develop new models that could fit the data better than existing approaches.