Cybersecurity is an arms race, with both the security and the adversaries attempting to outsmart one another, coming up with new attacks, new ways to defend against those attacks, and again with new ways to circumvent those defences. This situation creates a constant need for novel, realistic cybersecurity datasets. This paper introduces the effects of using machine-learning-based intrusion detection methods in network traffic coming from a real-life architecture. The main contribution of this work is a dataset coming from a real-world, academic network. Real-life traffic was collected and, after performing a series of attacks, a dataset was assembled. The dataset contains 44 network features and an unbalanced distribution of classes. In this work, the capability of the dataset for formulating machine-learning-based models was experimentally evaluated. To investigate the stability of the obtained models, cross-validation was performed, and an array of detection metrics were reported. The gathered dataset is part of an effort to bring security against novel cyberthreats and was completed in the SIMARGL project.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8272217 | PMC |
http://dx.doi.org/10.3390/s21134319 | DOI Listing |
Data Brief
December 2024
Department of Computer Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran.
With the development of smart buildings, the risks of cyber-attacks against them have also increased. One of the popular and evolving protocols used for communication between devices in smart buildings, especially HVAC systems, is the BACnet protocol. Machine learning algorithms and neural networks require datasets of normal traffic and real attacks to develop intrusion detection (IDS) and prevention (IPS) systems that can detect anomalies and prevent attacks.
View Article and Find Full Text PDFSci Rep
December 2024
Department of Computer Science , Applied College, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia.
Over the past two decades, cloud computing has experienced exponential growth, becoming a critical resource for organizations and individuals alike. However, this rapid adoption has introduced significant security challenges, particularly in intrusion detection, where traditional systems often struggle with low detection accuracy and high processing times. To address these limitations, this research proposes an optimized Intrusion Detection System (IDS) that leverages Graph Neural Networks and the Leader K-means clustering algorithm.
View Article and Find Full Text PDFSci Rep
December 2024
School of Computer Science and Engineering (SCOPE), VIT-AP University, Amaravati, Andhra Pradesh, India.
The Internet of Things (IoT) network is a fast-growing technology, which is efficiently used in various applications. In an IoT network, the massive amount of connecting nodes is the existence of day-to-day communication challenges. The platform of IoT uses a cloud service as a backend for processing information and maintaining remote control.
View Article and Find Full Text PDFSci Rep
December 2024
Computer Engineering Department, UET Taxila, Rawalpindi, Punjab, 47050, Pakistan.
IoT device security has become a major concern as a result of the rapid expansion of the Internet of Things (IoT) and the growing adoption of cloud computing for central monitoring and management. In order to provide centrally managed services each IoT device have to connect to their respective High-Performance Computing (HPC) clouds. The ever increasing deployment of Internet of Things (IoT) devices linked to HPC clouds use various medium such as wired and wireless.
View Article and Find Full Text PDFMar Pollut Bull
December 2024
Faculty of Engineering, Cairo University, 1 Gamaa Street, P.O. Box 12613, Giza, Egypt.
Archaeological sites in deltaic regions face increasing environmental threats. This study provides the first assessment of seawater intrusion and land subsidence impacts on archaeological sites in the Nile Delta through hydrochemical investigations, InSAR techniques, and multi-criteria decision analysis of 33 sites. The results reveal that 80.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!