Academic literature on the topic 'CIC-IDS 2017 dataset'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CIC-IDS 2017 dataset.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "CIC-IDS 2017 dataset"

1

Imene, BENSID, Dr MAHIMOUD Aissa, and Dr BOUDJADJA Rafik. "Analyzing and Exploring CIC-IDS 2017 Dataset." International Journal of Political Science 9, no. 1 (2023): 10–15. http://dx.doi.org/10.20431/2454-9452.0901002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Imene, BENSID, Dr MAHIMOUD Aissa, and Dr BOUDJADJA Rafik. "Analyzing and Exploring CIC-IDS 2017 Dataset." International Journal of Research Studies in Computer Science and Engineering 9, no. 1 (2023): 10–15. http://dx.doi.org/10.20431/2349-4859.0901002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yulianto, Arif, Parman Sukarno, and Novian Anggis Suwastika. "Improving AdaBoost-based Intrusion Detection System (IDS) Performance on CIC IDS 2017 Dataset." Journal of Physics: Conference Series 1192 (March 2019): 012018. http://dx.doi.org/10.1088/1742-6596/1192/1/012018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mohammad, Rasheed, Faisal Saeed, Abdulwahab Ali Almazroi, Faisal S. Alsubaei, and Abdulaleem Ali Almazroi. "Enhancing Intrusion Detection Systems Using a Deep Learning and Data Augmentation Approach." Systems 12, no. 3 (2024): 79. http://dx.doi.org/10.3390/systems12030079.

Full text
Abstract:
Cybersecurity relies heavily on the effectiveness of intrusion detection systems (IDSs) in securing business communication because they play a pivotal role as the first line of defense against malicious activities. Despite the wide application of machine learning methods for intrusion detection, they have certain limitations that might be effectively addressed by leveraging different deep learning architectures. Furthermore, the evaluation of the proposed models is often hindered by imbalanced datasets, limiting a comprehensive assessment of model efficacy. Hence, this study aims to address these challenges by employing data augmentation methods on four prominent datasets, the UNSW-NB15, 5G-NIDD, FLNET2023, and CIC-IDS-2017, to enhance the performance of several deep learning architectures for intrusion detection systems. The experimental results underscored the capability of a simple CNN-based architecture to achieve highly accurate network attack detection, while more complex architectures showed only marginal improvements in performance. The findings highlight how the proposed methods of deep learning-based intrusion detection can be seamlessly integrated into cybersecurity frameworks, enhancing the ability to detect and mitigate sophisticated network attacks. The outcomes of this study have shown that the intrusion detection models have achieved high accuracy (up to 91% for the augmented CIC-IDS-2017 dataset) and are strongly influenced by the quality and quantity of the dataset used.
APA, Harvard, Vancouver, ISO, and other styles
5

Nitin W. Wanhade. "Accelerating Intrusion Detection Dataset Analysis- A Framework Using AutoGen Agents for CIC-IDS 2017." Journal of Information Systems Engineering and Management 10, no. 5s (2025): 671–81. https://doi.org/10.52783/jisem.v10i5s.758.

Full text
Abstract:
An IDS is a vital component in securing any network, however, the practical operation of an IDC is often dependent upon reasonable response times for the data with a huge volume. In this paper, we attempt to enhance the analysis of the CIC-IDS 2017 dataset using AutoGen, a deep learning model framework related to state-of-the-art. AutoGen performs a lot of the work automatically without requiring human intervention bottlenecks such as data preprocessing, feature engineering, or even model training thus saving a lot of time and work when developing an IDS. We compared the performance of AutoGen against prompt-based language models by focusing on task completion metrics along with three additional metrics: Humane Evaluation score, time taken, and resource overhead. The results exhibited that AutoGen is far superior to conventional ones in every way possible. In summary, the findings of this study demonstrate AutoGen’s popularity for the future of intrusion detection through its data analysis function in the bias of the entire system performance parameter.
APA, Harvard, Vancouver, ISO, and other styles
6

Gutiérrez-Galeano, Leopoldo, Juan-José Domínguez-Jiménez, Jörg Schäfer, and Inmaculada Medina-Bulo. "LLM-Based Cyberattack Detection Using Network Flow Statistics." Applied Sciences 15, no. 12 (2025): 6529. https://doi.org/10.3390/app15126529.

Full text
Abstract:
Cybersecurity is a growing area of research due to the constantly emerging new types of cyberthreats. Tools and techniques exist to keep systems secure against certain known types of cyberattacks, but are insufficient for others that have recently appeared. Therefore, research is needed to design new strategies to deal with new types of cyberattacks as they arise. Existing tools that harness artificial intelligence techniques mainly use artificial neural networks designed from scratch. In this paper, we present a novel approach for cyberattack detection using an encoder–decoder pre-trained Large Language Model (T5), fine-tuned to adapt its classification scheme for the detection of cyberattacks. Our system is anomaly-based and takes statistics of already finished network flows as input. This work makes significant contributions by introducing a novel methodology for adapting its original task from natural language processing to cybersecurity, achieved by transforming numerical network flow features into a unique abstract artificial language for the model input. We validated the robustness of our detection system across three datasets using undersampling. Our model achieved consistently high performance across all evaluated datasets. Specifically, for the CIC-IDS-2017 dataset, we obtained an accuracy, precision, recall, and F-score of more than 99.94%. For CSE-CIC-IDS-2018, these metrics exceeded 99.84%, and for BCCC-CIC-IDS-2017, they were all above 99.90%. These results collectively demonstrate superior performance for cyberattack detection, while maintaining highly competitive false-positive rates and false-negative rates. This efficacy is achieved by relying exclusively on real-world network flow statistics, without the need for synthetic data generation.
APA, Harvard, Vancouver, ISO, and other styles
7

Ji, Changpeng, Haofeng Yu, and Wei Dai. "Network Traffic Anomaly Detection Based on Spatiotemporal Feature Extraction and Channel Attention." Processes 12, no. 7 (2024): 1418. http://dx.doi.org/10.3390/pr12071418.

Full text
Abstract:
To overcome the challenges of feature selection in traditional machine learning and enhance the accuracy of deep learning methods for anomaly traffic detection, we propose a novel method called DCGCANet. This model integrates dilated convolution, a GRU, and a Channel Attention Network, effectively combining dilated convolutional structures with GRUs to extract both temporal and spatial features for identifying anomalous patterns in network traffic. The one-dimensional dilated convolution (DC-1D) structure is designed to expand the receptive field, allowing for comprehensive traffic feature extraction while minimizing information loss typically caused by pooling operations. The DC structure captures spatial dependencies in the data, while the GRU processes time series data to capture dynamic traffic changes. Furthermore, the channel attention (CA) module assigns importance-based weights to features in different channels, enhancing the model’s representational capacity and improving its ability to detect abnormal traffic. DCGCANet achieved an accuracy rate of 99.6% on the CIC-IDS-2017 dataset, outperforming other algorithms. Additionally, the model attained precision, recall, and F1 score rates of 99%. The generalization capability of DCGCANet was validated on a subset of CIC-IDS-2017, demonstrating superior detection performance and robust generalization potential.
APA, Harvard, Vancouver, ISO, and other styles
8

Jinsi, Jose, and V. Jose Deepa. "Deep learning algorithms for intrusion detection systems in internet of things using CIC-IDS 2017 dataset." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 1134–41. https://doi.org/10.11591/ijece.v13i1.pp1134-1141.

Full text
Abstract:
Due to technological advancements in recent years, the availability and usage of smart electronic gadgets have drastically increased. Adoption of these smart devices for a variety of applications in our day-to-day life has become a new normal. As these devices collect and store data, which is of prime importance, securing is a mandatory requirement by being vigilant against intruders. Many traditional techniques are prevailing for the same, but they may not be a good solution for the devices with resource constraints. The impact of artificial intelligence is not negligible in this concern. This study is an attempt to understand and analyze the performance of deep learning algorithms in intrusion detection. A comparative analysis of the performance of deep neural network, convolutional neural network, and long short-term memory using the CIC-IDS 2017 dataset.
APA, Harvard, Vancouver, ISO, and other styles
9

Jose, Jinsi, and Deepa V. Jose. "Deep learning algorithms for intrusion detection systems in internet of things using CIC-IDS 2017 dataset." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 1134. http://dx.doi.org/10.11591/ijece.v13i1.pp1134-1141.

Full text
Abstract:
Due to technological advancements in recent years, the availability and usage of smart electronic gadgets have drastically increased. Adoption of these smart devices for a variety of applications in our day-to-day life has become a new normal. As these devices collect and store data, which is of prime importance, securing is a mandatory requirement by being vigilant against intruders. Many traditional techniques are prevailing for the same, but they may not be a good solution for the devices with resource constraints. The impact of artificial intelligence is not negligible in this concern. This study is an attempt to understand and analyze the performance of deep learning algorithms in intrusion detection. A comparative analysis of the performance of deep neural network, convolutional neural network, and long short-term memory using the CIC-IDS 2017 dataset.
APA, Harvard, Vancouver, ISO, and other styles
10

Mao, Junyi, Xiaoyu Yang, Bo Hu, Yizhen Lu, and Guangqiang Yin. "Intrusion Detection System Based on Multi-Level Feature Extraction and Inductive Network." Electronics 14, no. 1 (2025): 189. https://doi.org/10.3390/electronics14010189.

Full text
Abstract:
With the rapid development of the internet, network security threats are becoming increasingly complex and diverse, making traditional intrusion detection systems (IDSs) inadequate for handling the growing variety of sophisticated attacks. In particular, traditional methods based on rule matching and manual feature extraction demonstrate significant limitations in dealing with small samples and unknown attacks. This paper proposes an intrusion detection system based on multi-level feature extraction and inductive learning (MFEI-IDS) to address these challenges. The model innovatively integrates Fully Convolutional Networks (FCNs) with the Transformer architecture (FCN–Transformer) for feature extraction and utilizes an inductive learning component for efficient classification. The FCN–Transformer Encoder extracts multi-level features from raw network traffic, capturing local spatial patterns and global temporal dependencies, significantly enhancing the representation of network traffic while reducing reliance on manual feature engineering. The inductive learning module employs a dynamic routing mechanism to map sample feature vectors into robust class vector representations, achieving superior generalization when detecting unseen attack types. Compared to existing FCN–Transformer models, MFEI-IDS incorporates inductive learning to handle data imbalance and small-sample scenarios. Experiments on ISCX 2012 and CIC-IDS 2017 datasets show that MFEI-IDS outperforms mainstream IDS methods in accuracy, precision, recall, and F1-score, excelling in cross-dataset validation and demonstrating strong generalization capabilities. These results validate the practical potential of MFEI-IDS in small-sample learning, unknown attack detection, and dynamic network environments.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "CIC-IDS 2017 dataset"

1

Alozie, Chisom Elizabeth. "Feature selection and machine learning model optimization for DDoS detection." In Deep Science Publishing. Deep Science Publishing, 2025. https://doi.org/10.70593/978-93-49307-78-0_3.

Full text
Abstract:
In this chapter, the Implementation design is divided into two sections, the system setup design, and the machine learning flow process design. Both are explained in detail in the section. The dataset used for the experiment was obtained from the open-source database CSE-CIC-IDS2018 (‘IDS 2018’ 2022) and the generated data set. The open-source dataset was used to train a large data set that contained 300967 instances of benign and DDoS datasets while the generated data set contained 28, 972 instances of benign and DDoS datasets. The dataset contained many fields in which “32 out of 80” features were used for the open data set and “31 out of 84” was used for the newly generated dataset. A comparative study of supervised machine learning algorithms which will be used to predict the accuracy and clarity of how DDoS attacks are detected in the cloud will be presented and evaluated in terms of performance and accuracy.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "CIC-IDS 2017 dataset"

1

Bandarupalli, Gopichand. "Efficient Deep Neural Network for Intrusion Detection Using CIC-IDS-2017 Dataset." In 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT). IEEE, 2025. https://doi.org/10.1109/ce2ct64011.2025.10940012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saidane, Samia, Francesco Telch, Kussai Shahin, and Fabrizio Granelli. "Optimizing Intrusion Detection System Performance through Synergistic Hyperparameter Tuning and Advanced Data Processing." In 11th International Conference on Computer Science, Engineering and Information Technology. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.141411.

Full text
Abstract:
Intrusion detection is vital for securing computer networks against malicious activities. Traditional methods struggle to detect complex patterns and anomalies in network traffic effectively. To address this issue, we propose a system combining deep learning, data balancing (K-means + SMOTE), high-dimensional reduction (PCA and FCBF), and hyperparameter optimization (Extra Trees and BO-TPE) to enhance intrusion detection performance. By training on extensive datasets like CIC IDS 2018 and CIC IDS 2017, our models demonstrate robust performance and generalization. Notably, the ensemble model "VGG19" consistently achieves remarkable accuracy (99.26% on CIC-IDS2017 and 99.22% on CSE-CIC-IDS2018), outperforming other models.
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Lisa, Gints Engelen, Timothy Lynar, Daryl Essam, and Wouter Joosen. "Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018." In 2022 IEEE Conference on Communications and Network Security (CNS). IEEE, 2022. http://dx.doi.org/10.1109/cns56114.2022.9947235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Elahi, Md Ashik, Rafi Ahammed Songram, and Md Shahid Uz Zaman. "Network-Shield: Exploring the Efficacy of GRU Model in Intrusion Detection Using CIC-IDS 2018 Dataset." In ICCA 2024: 3rd International Conference on Computing Advancements. ACM, 2024. https://doi.org/10.1145/3723178.3723318.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Klepetko, Randy, and Ram Krishnan. "Micam: Visualizing Feature Extraction of Nonnatural Data." In 4th International Conference on Machine Learning and Soft Computing. Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130201.

Full text
Abstract:
Convolutional Neural Networks (CNN) continue to revolutionize image recognition technology and are being used in non-image related fields such as cybersecurity. They are known to work as feature extractors, identifying patterns within large data sets, but when dealing with nonnatural data, what these features represent is not understood. Several class activation map (CAM) visualization tools are available that assist with understanding the CNN decisions when used with images, but they are not intuitively comprehended when dealing with nonnatural security data. Understanding what the extracted features represent should enable the data analyst and model architect tailor a model to maximize the extracted features while minimizing the computational parameters. In this paper we offer a new tool Model integrated Class Activation Maps, (MiCAM) which allows the analyst the ability to visually compare extracted feature intensities at the individual layer detail. We explore using this new tool to analyse several datasets. First the MNIST handwriting data set to gain a baseline understanding. We then analyse two security data sets: computers process metrics from cloud based application servers that are infected with malware and the CIC-IDS-2017 IP data traffic set and identify how re-ordering nonnatural security related data affects feature extraction performance and identify how reordering the data affect feature extraction performance.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!