On generating network traffic datasets with synthetic attacks for intrusion detection.
Carlos Garcia CorderoEmmanouil VasilomanolakisAidmar WainakhMax MühlhäuserSimin Nadjm-TehraniPublished in: CoRR (2019)
Keyphrases
- network traffic data
- intrusion detection
- network traffic
- intrusion detection system
- network intrusions
- network intrusion detection
- anomaly detection
- network intrusion
- network attacks
- traffic analysis
- network security
- network intrusion detection systems
- malicious traffic
- network management
- intrusion prevention
- detecting anomalous
- network monitoring
- computer networks
- traffic data
- computer security
- alert correlation
- misuse detection
- normal traffic
- data mining
- normal behavior
- internet traffic
- traffic patterns
- traffic engineering
- reinforcement learning
- metadata
- real world
- intrusion detection and prevention