External Data Source
In this project we attempt at solving this problem by presenting two taxonomies A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets and A Taxonomy of Malicious Traffic for Intrusion Detection Systems , classifying threats as well as evaluating current datasets. The result shows that a large portion of current research published train IDS algorithms against outdated datasets and outdated threats. To this end, we provide the source ofour threat...
This data repository is not currently reporting usage information. For information on how your repository can submit usage information, please see our documentation.