An advanced Intrusion Detection System for iiot based on ga and Tree based Algorithms



Download 1,39 Mb.
Pdf ko'rish
bet4/13
Sana01.02.2023
Hajmi1,39 Mb.
#906446
1   2   3   4   5   6   7   8   9   ...   13
Bog'liq
An Advanced Intrusion Detection System for IIoT Based on GA and Tree Based Algorithms

III. THE UNSW-NB15 DATASET
The UNSW-NB15 [
19
] is an advanced dataset used for
IDS research and it is widely used in the literature. The
raw packets (network traces) contained in the UNSW-NB15
dataset were generated by the IXIA PerfectStorm tool in
a laboratory set-up of the Cyber Range Laboratory of the
Australian Center for Cybersecurity (ACCS). The UNSW-
NB15 contains 42 attributes listed in Table 1. As depicted
in the list of attributes in Table 1 ; 3 features are categorical
in nature and 39 attributes are numerical (
binary
,
float
and
integer
).
The UNSW-NB15 is composed of two datasets that in-
clude the UNSW-NB15-train and the UNSW-NB15-test. In
this paper, UNSW-NB15-train is further divided into two
datasets. The first one is the UNSW-NB15-75 that makes up
75% of the full UNSW-NB15-train. The second one is the
VOLUME X, 2019
5


This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2021.3104113, IEEE Access
S.M. Kasongo
et al.
: An advanced Intrusion Detection System for IIoT Based on GA and Tree based Algorithms based Algorithms
UNSW-NB15-25 that accounts for 25% of the UNSW-NB15-
train subset. In this study, UNSW-NB15-75 is used during
the training phase of the models and the UNSW-NB15-25 is
used during the validation phase of the models. It is crucial
to perform a validation process to guarantee that the results
that were obtained during the training phase are optimal.
Moreover, the validation results
must
be like those of the
training procedure. The entire UNSW-NB15-test dataset is
used during the testing phase of the models presented in this
research.
The UNSW-NB15 intrusion detection dataset contains the
following nine categories of attacks [
20
]:
Fuzzers, Analysis, Exploits, Worms, Shellcode, DoS,
Generic, Reconnaissance, and Backdoor. The value distribu-
tion of the UNSW-NB15 (UNSW-NB15-100), the UNSW-
NB15-75, the UNSW-NB15-25, and the UNSW-NB15-
TEST datasets are shown in Table 2.

Download 1,39 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   ...   13




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish