Mostrar el registro sencillo del ítem

dc.contributor.authorMedina-Arco, Joaquín Gaspar
dc.contributor.authorMagán Carrión, Roberto 
dc.contributor.authorRodríguez-Gómez, Rafael Alejandro
dc.contributor.authorGarcía Teodoro, Pedro 
dc.date.accessioned2024-04-01T09:42:26Z
dc.date.available2024-04-01T09:42:26Z
dc.date.issued2024-01-12
dc.identifier.citationMedina-Arco, J.G.; Magán-Carrión, R.; Rodríguez-Gómez, R.A.; García-Teodoro, P. Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems. Sensors 2024, 24, 479. https://doi.org/10.3390/s24020479es_ES
dc.identifier.urihttps://hdl.handle.net/10481/90257
dc.descriptionThis publication has been partially funded by MICIN/AEI/10.13039/501100011033 under grants PID2020-113462RB-I00 and PID2020-114495RB-I00 and the PPJIA2022-51 and PPJIA2022-52 projects from the University of Granada’s own funding plan.es_ES
dc.description.abstractWith the significant increase in cyber-attacks and attempts to gain unauthorised access to systems and information, Network Intrusion-Detection Systems (NIDSs) have become essential detection tools. Anomaly-based systems use machine learning techniques to distinguish between normal and anomalous traffic. They do this by using training datasets that have been previously gathered and labelled, allowing them to learn to detect anomalies in future data. However, such datasets can be accidentally or deliberately contaminated, compromising the performance of NIDS. This has been the case of the UGR’16 dataset, in which, during the labelling process, botnet-type attacks were not identified in the subset intended for training. This paper addresses the mislabelling problem of real network traffic datasets by introducing a novel methodology that (i) allows analysing the quality of a network traffic dataset by identifying possible hidden or unidentified anomalies and (ii) selects the ideal subset of data to optimise the performance of the anomaly detection model even in the presence of hidden attacks erroneously labelled as normal network traffic. To this end, a two-step process that makes incremental use of the training dataset is proposed. Experiments conducted on the contaminated UGR’16 dataset in conjunction with the state-of-the-art NIDS, Kitsune, conclude with the feasibility of the approach to reveal observations of hidden botnet-based attacks on this dataset.es_ES
dc.description.sponsorshipMICIN/AEI/10.13039/501100011033 PID2020-113462RB-I00, PID2020-114495RB-I00es_ES
dc.description.sponsorshipUniversity of Granada PPJIA2022-51, PPJIA2022-52es_ES
dc.language.isoenges_ES
dc.publisherMDPIes_ES
dc.rightsAttribution-NoDerivatives 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by-nd/4.0/*
dc.subjectAnomaly detectiones_ES
dc.subjectNIDSes_ES
dc.subjectDeep learninges_ES
dc.subjectAutoencoderses_ES
dc.subjectMethodologyes_ES
dc.subjectReal network datasetses_ES
dc.subjectData qualityes_ES
dc.titleMethodology for the detection of contaminated training datasets for machine learning-based Network Intrusion Detection Systemses_ES
dc.typeinfo:eu-repo/semantics/articlees_ES
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses_ES
dc.identifier.doi10.3390/s24020479
dc.type.hasVersioninfo:eu-repo/semantics/publishedVersiones_ES


Ficheros en el ítem

[PDF]

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Attribution-NoDerivatives 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como Attribution-NoDerivatives 4.0 Internacional