ZYELL-NCTU NetTraffic-1.0: A Large-Scale Dataset for Real-World Network
Anomaly Detection
- URL: http://arxiv.org/abs/2103.05767v1
- Date: Mon, 8 Mar 2021 15:18:29 GMT
- Title: ZYELL-NCTU NetTraffic-1.0: A Large-Scale Dataset for Real-World Network
Anomaly Detection
- Authors: Lei Chen, Shao-En Weng, Chu-Jun Peng, Hong-Han Shuai, and Wen-Huang
Cheng
- Abstract summary: This work introduces a new, large-scale, and real-world dataset, ZYELL-NCTU NetTraffic-1.0, which is collected from the raw output of firewalls in a real network.
- Score: 23.351699149215776
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Network security has been an active research topic for long. One critical
issue is improving the anomaly detection capability of intrusion detection
systems (IDSs), such as firewalls. However, existing network anomaly datasets
are out of date (i.e., being collected many years ago) or IP-anonymized, making
the data characteristics differ from today's network. Therefore, this work
introduces a new, large-scale, and real-world dataset, ZYELL-NCTU
NetTraffic-1.0, which is collected from the raw output of firewalls in a real
network, with the objective to advance the development of network security
researches.
Related papers
- Automated Fault Detection in 5G Core Networks Using Large Language Models [0.9041331849728441]
In this study, we leverage Large Language Models (LLMs) to automate network fault detection and classification.<n>The dataset includes logs from different network components (pods), along with complementary data such as system descriptions, Round Trip Time (RTT) tests, and pod status information.<n>We fine-tuned the GPT-4.1 nano model via its API on this dataset, resulting in a significant improvement in fault-detection accuracy compared to the base model.
arXiv Detail & Related papers (2025-11-24T15:55:29Z) - One-Class Intrusion Detection with Dynamic Graphs [46.453758431767724]
Machine learning-based intrusion detection constitutes a promising approach for improving security.<n>We propose a novel intrusion detection method, TGN-SVDD, which builds upon modern dynamic graph modelling and deep anomaly detection.<n>We demonstrate its superiority over several baselines for realistic intrusion detection data and suggest a more challenging variant of the latter.
arXiv Detail & Related papers (2025-08-18T12:36:55Z) - SCGNet-Stacked Convolution with Gated Recurrent Unit Network for Cyber Network Intrusion Detection and Intrusion Type Classification [0.0]
Intrusion detection systems (IDSs) are far from being able to quickly and efficiently identify complex and varied network attacks.
The SCGNet is a novel deep learning architecture that we propose in this study.
It exhibits promising results on the NSL-KDD dataset in both task, network attack detection, and attack type classification with 99.76% and 98.92% accuracy, respectively.
arXiv Detail & Related papers (2024-10-29T09:09:08Z) - CESNET-TimeSeries24: Time Series Dataset for Network Traffic Anomaly Detection and Forecasting [0.0]
This manuscript introduces a dataset comprising time series data of network entities' behavior.
The dataset was created from 40 weeks of network traffic of 275 thousand active IP addresses.
It provides valuable insights into the practical deployment of forecast-based anomaly detection approaches.
arXiv Detail & Related papers (2024-09-27T16:10:11Z) - A Self-Supervised Task for Fault Detection in Satellite Multivariate Time Series [45.31237646796715]
This work proposes a novel approach leveraging Physics-Informed Real NVP neural networks, renowned for their ability to model complex and high-dimensional distributions.
The experiments involve various configurations, including pre-training with self-supervision, multi-task learning, and standalone self-supervised training.
Results indicate significant performance improvements across all settings.
arXiv Detail & Related papers (2024-07-03T07:19:41Z) - TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns
for Intrusion Detection [0.5261718469769447]
Existing datasets often fall short, lacking the necessary diversity and alignment with the contemporary network environment.
This paper introduces TII-SSRC-23, a novel and comprehensive dataset designed to overcome these challenges.
arXiv Detail & Related papers (2023-09-14T05:23:36Z) - Anomaly Detection Dataset for Industrial Control Systems [1.2234742322758418]
Industrial Control Systems (ICSs) have been targeted by cyberattacks and are becoming increasingly vulnerable.
The lack of suitable datasets for evaluating Machine Learning algorithms is a challenge.
This paper presents the 'ICS-Flow' dataset, which offers network data and process state variables logs for supervised and unsupervised ML-based IDS assessment.
arXiv Detail & Related papers (2023-05-11T14:52:19Z) - Leveraging a Probabilistic PCA Model to Understand the Multivariate
Statistical Network Monitoring Framework for Network Security Anomaly
Detection [64.1680666036655]
We revisit anomaly detection techniques based on PCA from a probabilistic generative model point of view.
We have evaluated the mathematical model using two different datasets.
arXiv Detail & Related papers (2023-02-02T13:41:18Z) - Online Anomalous Subtrajectory Detection on Road Networks with Deep
Reinforcement Learning [38.71141801699763]
We propose a novel reinforcement learning based solution called RL4OASD.
RL4OASD involves two networks, one responsible for learning features of road networks and trajectories and the other responsible for detecting anomalous subtrajectories.
arXiv Detail & Related papers (2022-11-12T15:17:57Z) - CPFN: Cascaded Primitive Fitting Networks for High-Resolution Point
Clouds [51.47100091540298]
We present Cascaded Primitive Fitting Networks (CPFN) that relies on an adaptive patch sampling network to assemble detection results of global and local primitive detection networks.
CPFN improves the state-of-the-art SPFN performance by 13-14% on high-resolution point cloud datasets and specifically improves the detection of fine-scale primitives by 20-22%.
arXiv Detail & Related papers (2021-08-31T23:27:33Z) - Anomaly Detection on Attributed Networks via Contrastive Self-Supervised
Learning [50.24174211654775]
We present a novel contrastive self-supervised learning framework for anomaly detection on attributed networks.
Our framework fully exploits the local information from network data by sampling a novel type of contrastive instance pair.
A graph neural network-based contrastive learning model is proposed to learn informative embedding from high-dimensional attributes and local structure.
arXiv Detail & Related papers (2021-02-27T03:17:20Z) - Few-shot Network Anomaly Detection via Cross-network Meta-learning [45.8111239825361]
We propose a new family of graph neural networks -- Graph Deviation Networks (GDN)
GDN can leverage a small number of labeled anomalies for enforcing statistically significant deviations between abnormal and normal nodes on a network.
We equip the proposed GDN with a new cross-network meta-learning algorithm to realize few-shot network anomaly detection.
arXiv Detail & Related papers (2021-02-22T16:42:37Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z) - Pelican: A Deep Residual Network for Network Intrusion Detection [7.562843347215287]
We propose a deep neural network, Pelican, that is built upon specially-designed residual blocks.
Pelican can achieve a high attack detection performance while keeping a much low false alarm rate.
arXiv Detail & Related papers (2020-01-19T05:07:48Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.