Skip to main content

Studying the Attack Detection Problem Using the Dataset CIDDS-001

  • Conference paper
  • First Online:
Digital Science (DSIC 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 381))

Included in the following conference series:

Abstract

Intrusion detection is an important problem in cybersecurity research. In recent years, researchers have leveraged different machine learning algorithms to empower intrusion detection systems (IDS). In this paper, we study the intrusion detection problem using the dataset CIDDS-001 released in 2017. The dataset is much different from the popular datasets using in the literature in that it is not equipped with a comprehensive feature list. We show empirically that we can effectively classify the attacks by using state-of-the-art machine learning algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Benkhelifa, E., Welsh, T., Hamouda, W.: A critical review of practices and challenges in intrusion detection systems for iot: toward universal and resilient systems. IEEE Commun. Surv. Tutor. 20(4), 3496–3509 (2018)

    Article  Google Scholar 

  2. Chen, T., Guestrin, C.: Xgboost: a scalable tree boosting system. In: KDD, pp. 785–794. ACM (2016)

    Google Scholar 

  3. Dang, Q.V.: Outlier detection in network flow analysis. arXiv:1808.02024 (2018). 4

  4. Dang, Q.V.: Studying machine learning techniques for intrusion detection systems. In: Dang, T., Küng, J., Takizawa, M., Bui, S. (eds.) Future Data and Security Engineering. FDSE 2019. LNCS, vol. 11814, pp. 411– 426. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-35653-8_28

  5. Dang, Q.V.: Active learning for intrusion detection systems. In: IEEE Research, Innovation and Vision for the Future (2020)

    Google Scholar 

  6. Dang, Q.V.: Understanding the Decision of Machine Learning Based Intrusion Detection Systems. In: Dang, T.K., Küng, J., Takizawa, M., Chung, T.M. (eds.) Future Data and Security Engineering. FDSE 2020. LNCS, vol. 12466, pp. 379–396. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-63924-2_22

  7. Dang, Q.V.: Improving the performance of the intrusion detection systems by the machine learning explainability. Int. J. Web Inf. Syst. (2021)

    Google Scholar 

  8. Dang, Q.V., Vo, T.H.: Reinforcement learning for the problem of detecting intrusion in a computer system. In: Proceedings of ICICT (2021)

    Google Scholar 

  9. Dorogush, A.V., Ershov, V., Gulin, A.: Catboost: gradient boosting with categorical features support. arXiv preprint arXiv:1810.11363 (2018)

  10. Elkan, C.: Results of the kdd’99 classifier learning. Acm Sigkdd Explor. Newsl. 1(2), 63–64 (2000)

    Article  Google Scholar 

  11. Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cybersecurity intrusion detection: approaches, datasets, and comparative study. J. Inf. Secur. Appl. 50, 102419 (2020)

    Google Scholar 

  12. Liu, F.T., Ting, K.M., Zhou, Z.: Isolation forest. In: ICDM, pp. 413–422. IEEE Computer Society (2008)

    Google Scholar 

  13. MontazeriShatoori, M., Davidson, L., Kaur, G., Lashkari, A.H.: Detection of doh tunnels using time-series classification of encrypted traffic. In: 2020 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), pp. 63–70. IEEE (2020)

    Google Scholar 

  14. Ring, M., Wunderlich, S., Grüdl, D., Landes, D., Hotho, A.: Flow-based benchmark data sets for intrusion detection. In: Proceedings of the 16th European Conference on Cyber Warfare and Security, pp. 361–369. ACPI (2017)

    Google Scholar 

  15. Salih, A.A., Abdulazeez, A.M.: Evaluation of classification algorithms for intrusion detection system: a review. J. Soft Comput. Data Min. 2(1), 31–40 (2021)

    Google Scholar 

  16. Samrin, R., Vasumathi, D.: Review on anomaly based network intrusion detection system. In: 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), pp. 141–147. IEEE (2017)

    Google Scholar 

  17. Settles, B.: Active learning. Synthesis Lect. Artif. Intell. Mach. Learn. 6(1), 1–114 (2012)

    Article  MathSciNet  Google Scholar 

  18. Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108–116 (2018)

    Google Scholar 

  19. Thakkar, A., Lohiya, R.: A review of the advancement in intrusion detection datasets. Procedia Comput. Sci. 167, 636–645 (2020)

    Article  Google Scholar 

  20. Wang, H., Bah, M.J., Hammad, M.: Progress in outlier detection techniques: a survey. IEEE Access 7, 107964–108000 (2019)

    Article  Google Scholar 

  21. Zhou, X., Hu, Y., Liang, W., Ma, J., Jin, Q.: Variational lstm enhanced anomaly detection for industrial big data. IEEE Trans. Ind. Inf. 17(5), 3469–3477 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quang-Vinh Dang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dang, QV. (2022). Studying the Attack Detection Problem Using the Dataset CIDDS-001. In: Antipova, T. (eds) Digital Science. DSIC 2021. Lecture Notes in Networks and Systems, vol 381. Springer, Cham. https://doi.org/10.1007/978-3-030-93677-8_46

Download citation

Publish with us

Policies and ethics