NF-CSE-CIC-IDS2018-v2_cv-全量 8 NF-CSE-CIC-IDS2018-v2_cv 全量预处理生成。由源文件(https://rdm.uq.edu.au/files/ce5161d0-ef9c-11ed-827d-e762de186848)预处理生成。数据包括:n_features, e_features, edge_index,edge_label, tvt, label2idx,edge_ids,node_label...
CIC-IDS-Incremental Testing Incremental Learning methods on the CIC IDS 2018 dataset The Jupyter notebook tests the effects of learning new classes incrementally for a CNN model using the CIC IDS 2018 dataset from https://www.kaggle.com/datasets/solarmainframe/ids-intrusion-csv. The CSV files ar...
INTRUSION detection systems (Computer security)This article examines intrusion detection systems in depth using the CSE-CIC-IDS-2018 dataset. The investigation is divided into three stages: to begin, data cleaning, exploratory data analysis, and data normalization procedures (min...
预处理文件 随机采样40% 交叉验证。数据包含n_features, e_features, edge_index,edge_label, tvt, label2idx,edge_ids,node_label
The proposed methodology significantly improves classification performance on the CSE-CIC-IDS2018 dataset, particularly for attack types where traditional average-based feature-ranking score combinations result in low classification metrics.Gcs, László...
Performance analysis of flow-based attacks detection on CSE-CIC-IDS2018 dataset using deep learningThe emergence of the Internet of Things (IOT) as a result of the development of the communications system has made the study of cyber security more important. Day after day, attacks evolve and ...
Benchmarking bioinspired machine learning algorithms with CSE-CIC-IDS2018 network intrusions datasetPaulo FerreiraMário AntunesPortuguese Conference on Pattern Recognition (RecPad'20)
预处理文件 交叉验证 随机采样40% 数据包含n_features, e_features, edge_index,edge_label, tvt, label2idx,edge_ids,node_label
Optimized Deep Learning with Binary PSO for Intrusion Detection on CSE-CIC-IDS2018 DatasetFarhan, Rawaa IsmaelMaolood, Abeer TariqHassan, Nidaa FlaihJournal of Qadisiyah Computer Science & Mathematics
This section briefly presents a background of the IDS, DNN, PSO, and CSE-CIC-IDS2018 dataset, as shown in the following subsections. 3.1. Intrusion Detection System An IDS is a piece of software, piece of hardware, or system that can detect harmful activity or protect the system from ins...