LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion Detection
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion Detection
Authors
Keywords
-
Journal
Electronics
Volume 9, Issue 5, Pages 800
Publisher
MDPI AG
Online
2020-05-14
DOI
10.3390/electronics9050800
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Real time dataset generation framework for intrusion detection systems in IoT
- (2020) Yahya Al-Hadhrami et al. Future Generation Computer Systems-The International Journal of eScience
- A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets
- (2020) Smitha Rajagopal et al. Security and Communication Networks
- Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches
- (2020) Roberto Magán-Carrión et al. Applied Sciences-Basel
- IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge
- (2020) Ibbad Hafeez et al. IEEE Transactions on Network and Service Management
- KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research
- (2019) Kamran Siddique et al. COMPUTER
- Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset
- (2019) Nickolaos Koroniotis et al. Future Generation Computer Systems-The International Journal of eScience
- MSML: A Novel Multilevel Semi-Supervised Machine Learning Framework for Intrusion Detection System
- (2019) Haipeng Yao et al. IEEE Internet of Things Journal
- A cyber network attack detection based on GM Median Nearest Neighbors LDA
- (2019) Zyad Elkhadir et al. COMPUTERS & SECURITY
- A survey of network-based intrusion detection data sets
- (2019) Markus Ring et al. COMPUTERS & SECURITY
- An Edge-Fog Secure Self-Authenticable Data Transfer Protocol
- (2019) Algimantas Venčkauskas et al. SENSORS
- Performance evaluation of unsupervised techniques in cyber-attack anomaly detection
- (2019) Jorge Meira et al. Journal of Ambient Intelligence and Humanized Computing
- A Survey of Intrusion Detection for In-Vehicle Networks
- (2019) Wufei Wu et al. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
- LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment
- (2019) Mohammad Wazid et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Robust detection for network intrusion of industrial IoT based on multi-CNN fusion
- (2019) Yanmiao Li et al. MEASUREMENT
- Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT
- (2019) Faezeh Farivar et al. IEEE Transactions on Industrial Informatics
- A survey on intrusion detection and prevention in wireless ad-hoc networks
- (2019) Khalid Khan et al. JOURNAL OF SYSTEMS ARCHITECTURE
- An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
- (2018) Sravani Challa et al. COMPUTERS & ELECTRICAL ENGINEERING
- UGR‘16: A new dataset for the evaluation of cyclostationarity-based network IDSs
- (2018) Gabriel Maciá-Fernández et al. COMPUTERS & SECURITY
- From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods
- (2018) Antonia Nisioti et al. IEEE Communications Surveys and Tutorials
- BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0
- (2018) Chao Lin et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A two-stage flow-based intrusion detection model for next-generation networks
- (2018) Muhammad Fahad Umer et al. PLoS One
- A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment
- (2018) Mohammad Wazid et al. IEEE Journal of Biomedical and Health Informatics
- Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review
- (2018) Fadi Salo et al. IEEE Access
- A holistic review of Network Anomaly Detection Systems: A comprehensive survey
- (2018) Nour Moustafa et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Design of secure key management and user authentication scheme for fog computing services
- (2018) Mohammad Wazid et al. Future Generation Computer Systems-The International Journal of eScience
- Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
- (2018) Mohammad Wazid et al. IEEE Internet of Things Journal
- Security and Privacy for Cloud-Based IoT: Challenges
- (2017) Jun Zhou et al. IEEE COMMUNICATIONS MAGAZINE
- Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers
- (2017) Hongbin Luo et al. IEEE Transactions on Information Forensics and Security
- An Intrusion Detection Framework Based on Hybrid Multi-Level Data Mining
- (2017) Haipeng Yao et al. INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING
- Cloud data integrity checking with an identity-based auditing mechanism from RSA
- (2016) Yong Yu et al. Future Generation Computer Systems-The International Journal of eScience
- A survey of network anomaly detection techniques
- (2016) Mohiuddin Ahmed et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Security in Software-Defined Networking: Threats and Countermeasures
- (2016) Zhaogang Shu et al. MOBILE NETWORKS & APPLICATIONS
- A survey of IT early warning systems: architectures, challenges, and solutions
- (2016) Ali Ahmadian Ramaki et al. Security and Communication Networks
- WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks
- (2016) Iman Almomani et al. Journal of Sensors
- Feature Selection Using Information Gain for Improved Structural-Based Alert Correlation
- (2016) Taqwa Ahmed Alhaj et al. PLoS One
- Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs
- (2015) Jun Zhou et al. IEEE Transactions on Information Forensics and Security
- Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter
- (2015) Guang Yao et al. IEEE Transactions on Information Forensics and Security
- A Reference Dataset for Network Traffic Activity Based Intrusion Detection System
- (2015) Raman Singh et al. International Journal of Computers Communications & Control
- A security and trust framework for virtualized networks and software-defined networking
- (2015) Zheng Yan et al. Security and Communication Networks
- Toward Incentivizing Anti-Spoofing Deployment
- (2014) Bingyang Liu et al. IEEE Transactions on Information Forensics and Security
- A survey of emerging threats in cybersecurity
- (2014) Julian Jang-Jaccard et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
- Security of the Internet of Things: perspectives and challenges
- (2014) Qi Jing et al. WIRELESS NETWORKS
- Network Anomaly Detection: Methods, Systems and Tools
- (2013) Monowar H. Bhuyan et al. IEEE Communications Surveys and Tutorials
- Estimating the number of hosts corresponding to an intrusion alert while preserving privacy
- (2013) Alif Wahid et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
- An Effective Network Traffic Classification Method with Unknown Flow Detection
- (2013) Jun Zhang et al. IEEE Transactions on Network and Service Management
- Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge
- (2012) Pedro Casas et al. COMPUTER COMMUNICATIONS
- ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches
- (2012) Yoshiki Kanda et al. COMPUTER COMMUNICATIONS
- Intrusion detection system: A comprehensive review
- (2012) Hung-Jen Liao et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis
- (2010) Zubair M Fadlullah et al. IEEE-ACM TRANSACTIONS ON NETWORKING
Find the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
SearchBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started