2024-03-29T13:57:20Zhttps://riubu.ubu.es/oai/requestoai:riubu.ubu.es:10259/72402023-02-16T13:35:40Zcom_10259_3847com_10259_5086com_10259_2604col_10259_3848
Repositorio Institucional de la Universidad de Burgos
author
Magán-Carrion, Roberto
author
Urda Muñoz, Daniel
author
Díaz-Cano, Ignacio
author
Dorronsoro, Bernabé
2023-01-13T13:24:25Z
2023-01-13T13:24:25Z
2020-03
http://hdl.handle.net/10259/7240
10.3390/app10051775
2076-3417
Presently, we are living in a hyper-connected world where millions of heterogeneous
devices are continuously sharing information in different application contexts for wellness, improving
communications, digital businesses, etc. However, the bigger the number of devices and connections
are, the higher the risk of security threats in this scenario. To counteract against malicious behaviours
and preserve essential security services, Network Intrusion Detection Systems (NIDSs) are the
most widely used defence line in communications networks. Nevertheless, there is no standard
methodology to evaluate and fairly compare NIDSs. Most of the proposals elude mentioning
crucial steps regarding NIDSs validation that make their comparison hard or even impossible.
This work firstly includes a comprehensive study of recent NIDSs based on machine learning
approaches, concluding that almost all of them do not accomplish with what authors of this paper
consider mandatory steps for a reliable comparison and evaluation of NIDSs. Secondly, a structured
methodology is proposed and assessed on the UGR’16 dataset to test its suitability for addressing
network attack detection problems. The guideline and steps recommended will definitively help
the research community to fairly assess NIDSs, although the definitive framework is not a trivial
task and, therefore, some extra effort should still be made to improve its understandability and
usability further.
eng
Atribución 4.0 Internacional
Network intrusion detection
Machine learning
Attack detection
Communications networks
Methodology
NIDS
Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches
info:eu-repo/semantics/article
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
URL
https://riubu.ubu.es/bitstream/10259/7240/1/Urda-as_2020.pdf
File
MD5
bda6ebfb2b5cd9772308a77058e58e86
499280
application/pdf
Urda-as_2020.pdf