Documente Academic
Documente Profesional
Documente Cultură
net/publication/326543226
CITATIONS READS
0 111
3 authors, including:
Some of the authors of this publication are also working on these related projects:
Real-time Intrusion Detection System using Artificial Intelligence with Stream Processing View project
All content following this page was uploaded by Nadun N Rajasinghe on 22 July 2018.
• Looked into
• IDS in Literature
• Work Done by previous members of research group
PCAP - Weka
o Attribute selection
➢ Still not addressed,
Last 100
Ex: Koyoto, NSL-KDD provide Destination Source IP
attributes related to multiple IP
• The software comes • Protocols used - TCP, UDP, IP, FTP, SMTP, SSH, SSL, ARP, DHCP,HTTP
with a list of
preselected attributes • Source and destination information - IP address, port numbers
but the user can
customize this.
Packet Dividing traffic into
Capturing time windows
• Select a time window and analyzing the traffic flow during that time.
Attribute Description
connection pairs The number of different source and destination pairs
num ports number of different port numbers used
src bytes the total amount of source traffic
tcp frame length the total amount of frame bytes for TCP traffic
udp length the total amount of UDP data
num ssl total number of packets containing SSL traffic