Skip to main content

Showing 1–3 of 3 results for author: Landes, D

Searching in archive cs. Search in all archives.
.
  1. Comparison of System Call Representations for Intrusion Detection

    Authors: Sarah Wunderlich, Markus Ring, Dieter Landes, Andreas Hotho

    Abstract: Over the years, artificial neural networks have been applied successfully in many areas including IT security. Yet, neural networks can only process continuous input data. This is particularly challenging for security-related non-continuous data like system calls. This work focuses on four different options to preprocess sequences of system calls so that they can be processed by neural networks. T… ▽ More

    Submitted 28 May, 2019; v1 submitted 15 April, 2019; originally announced April 2019.

    Comments: 12 pages, 1 figure, submitted to CISIS 2019

  2. A Survey of Network-based Intrusion Detection Data Sets

    Authors: Markus Ring, Sarah Wunderlich, Deniz Scheuring, Dieter Landes, Andreas Hotho

    Abstract: Labeled data sets are necessary to train and evaluate anomaly-based network intrusion detection systems. This work provides a focused literature survey of data sets for network-based intrusion detection and describes the underlying packet- and flow-based network data in detail. The paper identifies 15 different properties to assess the suitability of individual data sets for specific evaluation sc… ▽ More

    Submitted 6 July, 2019; v1 submitted 6 March, 2019; originally announced March 2019.

    Comments: submitted manuscript to Computer & Security

    Journal ref: Computer & Security 2019

  3. Flow-based Network Traffic Generation using Generative Adversarial Networks

    Authors: Markus Ring, Daniel Schlör, Dieter Landes, Andreas Hotho

    Abstract: Flow-based data sets are necessary for evaluating network-based intrusion detection systems (NIDS). In this work, we propose a novel methodology for generating realistic flow-based network traffic. Our approach is based on Generative Adversarial Networks (GANs) which achieve good results for image generation. A major challenge lies in the fact that GANs can only process continuous attributes. Howe… ▽ More

    Submitted 27 September, 2018; originally announced October 2018.

    Comments: 37 pages, submitted to Computer & Security