A Survey Current Datasets used for Intrusion Detection using Machine Learning
Keywords:
Intrusion Detection system, Machine Learning, Cyber Attacks, UNSW-NB15 Data Set, CICIDS2018 Data Set, CICIDS2017 Data Set, DARPA Data Set, NSL-KDD Data Set, KDD’99Data Set, ADFA-IDS Data SetAbstract
Cyberattacks in today's digital age cause the loss of sensitive data and a huge financial loss for enterprises and countries. Therefore, the role of the cyber security expert is very important to protect data from increased and new attacks. Researchers focus on anomaly-based intrusion detection systems to detect these unknown attacks and machine learning algorithms play a vital role in this process because they detect attacks accurately. Data sets currently used in intrusion detection systems suffer from a clear lack of real network threats, attack representation, and include a large number of abandoned threats, which limit the accuracy of detection within the current intrusion detection systems' methods of machine learning, which make them unable to trace increasing and new attacks in cloud environments, containers. This research paper aims to combine classification and analysis of existing data sets in order to improve the creation new data sets that simulate the actual reality of the network's real data. This will improve the efficiency of the next generation of intrusion detection systems and reflect network threats more accurately
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 ttps://creativecommons.org/licenses/by-nc-sa/4.0/

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The authors retain the copyright and grant the right to publish in the magazine for the first time with the transfer of the commercial right to Tishreen University Journal for Research and Scientific Studies - Engineering Sciences Series
Under a CC BY- NC-SA 04 license that allows others to share the work with of the work's authorship and initial publication in this journal. Authors can use a copy of their articles in their scientific activity, and on their scientific websites, provided that the place of publication is indicted in Tishreen University Journal for Research and Scientific Studies - Engineering Sciences Series . The Readers have the right to send, print and subscribe to the initial version of the article, and the title of Tishreen University Journal for Research and Scientific Studies - Engineering Sciences Series Publisher
journal uses a CC BY-NC-SA license which mean
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material
- The licensor cannot revoke these freedoms as long as you follow the license terms.
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- NonCommercial — You may not use the material for commercial purposes.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.