A Critique on the Use of Machine Learning on Public Datasets for Intrusion Detection.
Marta CatilloAndrea Del VecchioAntonio PecchiaUmberto VillanoPublished in: QUATIC (2021)
Keyphrases
- intrusion detection
- machine learning
- intrusion detection system
- data mining
- anomaly detection
- network security
- network intrusion detection
- network traffic
- information security
- artificial immune
- cyber security
- high detection rate
- network intrusion
- false positives and false negatives
- learning algorithm
- detecting anomalous
- pattern recognition
- alert correlation
- computer security
- network attacks
- computer networks
- supervised learning
- text classification
- decision trees
- network intrusion detection systems
- data sets
- data mining techniques
- knowledge discovery
- model selection
- computational intelligence
- text mining
- principal component analysis
- feature space
- network traffic data
- data analysis
- training data
- real world