UNR-IDD: Intrusion Detection Dataset using Network Port Statistics

被引:11
作者
Das, Tapadhir [1 ]
Abu Hamdan, Osama [1 ]
Shukla, Raj Mani [2 ]
Sengupta, Shamik [1 ]
Arslan, Engin [1 ]
机构
[1] Univ Nevada, Dept Comp Sci & Engn, Reno, NV 89557 USA
[2] Anglia Ruskin Univ, Sch Comp & Informat Sci, Cambridge, England
来源
2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC | 2023年
基金
美国国家科学基金会;
关键词
Computer networks; network intrusion detection; machine learning; dataset;
D O I
10.1109/CCNC51644.2023.10059640
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Multiple datasets have been proposed to create Machine Learning (ML)-based Network Intrusion Detection Systems (NIDS). However, many of these datasets suffer from suboptimal performance and inadequate tail class representation. In this paper, we propose the University of Nevada - Reno Intrusion Detection Dataset (UNR-IDD), which utilizes network port statistics for fine-grained analysis of intrusions. Evaluation results show that UNR-IDD is better than existing NIDS datasets with an F-mu score of 94% and a minimum F-score of 86%. This is mainly because of sufficient and equal representation of various anomaly types in the UNR-IDD dataset.
引用
收藏
页数:4
相关论文
共 16 条
[1]  
[Anonymous], 2004, B.S. thesis,
[2]  
[Anonymous], 2006, Description of Kyoto University Benchmark Data
[3]  
caida, 2013, DOWNLOADS CAIDA ONLI
[4]   Random Forest Modeling for Network Intrusion Detection System [J].
Farnaaz, Nabila ;
Jabbar, M. A. .
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 :213-217
[5]  
.kaggle, UNR IDD INTRUSION DE
[6]  
kdd.ics.uci, KDD CUP 1999 data
[7]   The 1999 DARPA off-line intrusion detection evaluation [J].
Lippmann, R ;
Haines, JW ;
Fried, DJ ;
Korba, J ;
Das, K .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2000, 34 (04) :579-595
[8]  
Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)
[9]   "Why Should I Trust You?" Explaining the Predictions of Any Classifier [J].
Ribeiro, Marco Tulio ;
Singh, Sameer ;
Guestrin, Carlos .
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, :1135-1144
[10]  
Sangster B., 2009, Proceedings of the 2nd conference on Cyber security experimentation and test, P9