|
Allow me to introduce you to some of the several related works. DARPA 98 and 99 included the denial-of-service dos buffer overflow port scans or rootkits. In KDD cup 99, they included the primary attributes about TCP connections and several high-level attributes such as numbers of field logins and over 20 different types of attacks. In the NSL KDD, they try to come up with the enhancement by removing the duplicates from the KDD cup 99. In PU-IDS, it comes with a generator extracting statistical features from the dataset. |