Cybersecurity is an arms race, with both the security and the adversaries attempting to outsmart one another, coming up with new attacks, new ways to defend against those attacks, and again with new ways to circumvent those defences. This situation creates a constant need for novel, realistic cybersecurity datasets. This paper introduces the effects of using machine-learning-based intrusion detection methods in network traffic coming from a real-life architecture. The main contribution of this work is a dataset coming from a real-world, academic network. Real-life traffic was collected and, after performing a series of attacks, a dataset was assembled. The dataset contains 44 network features and an unbalanced distribution of classes. In this work, the capability of the dataset for formulating machine-learning-based models was experimentally evaluated. To investigate the stability of the obtained models, cross-validation was performed, and an array of detection metrics were reported. The gathered dataset is part of an effort to bring security against novel cyberthreats and was completed in the SIMARGL project.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8272217PMC
http://dx.doi.org/10.3390/s21134319DOI Listing

Publication Analysis

Top Keywords

intrusion detection
8
attacks ways
8
dataset
6
proposition evaluation
4
evaluation roedunet-simargl2021
4
network
4
roedunet-simargl2021 network
4
network intrusion
4
detection dataset
4
dataset cybersecurity
4

Similar Publications

With the development of smart buildings, the risks of cyber-attacks against them have also increased. One of the popular and evolving protocols used for communication between devices in smart buildings, especially HVAC systems, is the BACnet protocol. Machine learning algorithms and neural networks require datasets of normal traffic and real attacks to develop intrusion detection (IDS) and prevention (IPS) systems that can detect anomalies and prevent attacks.

View Article and Find Full Text PDF

Over the past two decades, cloud computing has experienced exponential growth, becoming a critical resource for organizations and individuals alike. However, this rapid adoption has introduced significant security challenges, particularly in intrusion detection, where traditional systems often struggle with low detection accuracy and high processing times. To address these limitations, this research proposes an optimized Intrusion Detection System (IDS) that leverages Graph Neural Networks and the Leader K-means clustering algorithm.

View Article and Find Full Text PDF

The Internet of Things (IoT) network is a fast-growing technology, which is efficiently used in various applications. In an IoT network, the massive amount of connecting nodes is the existence of day-to-day communication challenges. The platform of IoT uses a cloud service as a backend for processing information and maintaining remote control.

View Article and Find Full Text PDF

A hybrid AI based framework for enhancing security in satellite based IoT networks using high performance computing architecture.

Sci Rep

December 2024

Computer Engineering Department, UET Taxila, Rawalpindi, Punjab, 47050, Pakistan.

IoT device security has become a major concern as a result of the rapid expansion of the Internet of Things (IoT) and the growing adoption of cloud computing for central monitoring and management. In order to provide centrally managed services each IoT device have to connect to their respective High-Performance Computing (HPC) clouds. The ever increasing deployment of Internet of Things (IoT) devices linked to HPC clouds use various medium such as wired and wireless.

View Article and Find Full Text PDF

Archaeological sites in deltaic regions face increasing environmental threats. This study provides the first assessment of seawater intrusion and land subsidence impacts on archaeological sites in the Nile Delta through hydrochemical investigations, InSAR techniques, and multi-criteria decision analysis of 33 sites. The results reveal that 80.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!