Mostrar el registro sencillo del ítem

Ponencia

dc.contributor.editorVarela Vaca, Ángel Jesúses
dc.contributor.editorCeballos Guerrero, Rafaeles
dc.contributor.editorReina Quintero, Antonia Maríaes
dc.creatorMedina Arco, Joaquín Gaspares
dc.creatorMagán Carrión, Robertoes
dc.creatorRodríguez Gómez, Rafael A.es
dc.creatorGarcía Teodoro, Pedroes
dc.date.accessioned2024-07-19T08:05:03Z
dc.date.available2024-07-19T08:05:03Z
dc.date.issued2024
dc.identifier.citationMedina Arco, J.G., Magán Carrión, R., Rodríguez Gómez, R.A. y García Teodoro, P. (2024). Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems [Póster]. En Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla) (466-467), Sevilla: Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática.
dc.identifier.isbn978-84-09-62140-8es
dc.identifier.urihttps://hdl.handle.net/11441/161544
dc.description.abstractWith the significant increase in cyber-attacks and attempts to gain unauthorised access to systems and information, Network Intrusion-Detection Systems (NIDSs) have become essential detection tools. Anomaly-based systems use machine learning techniques to distinguish between normal and anomalous traffic. They do this by using training datasets that have been previously gathered and labelled, allowing them to learn to detect anomalies in future data. However, such datasets can be accidentally or deliberately contaminated, compromising the performance of NIDSs. This paper addresses the mislabelling problem of real network traffic datasets by introducing a novel methodology that (i) allows analysing the quality of a network traffic dataset by identifying possible hidden or unidentified anomalies and (ii) selects the ideal subset of data to optimise the performance of the anomaly detection model even in the presence of hidden attacks erroneously labelled as normal network traffic.es
dc.formatapplication/pdfes
dc.format.extent2es
dc.language.isoenges
dc.publisherUniversidad de Sevilla. Escuela Técnica Superior de Ingeniería Informáticaes
dc.relation.ispartofJornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla) (2024), pp. 466-467.
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectAnomaly detectiones
dc.subjectNIDSes
dc.subjectDeep learninges
dc.subjectAutoencoderses
dc.subjectMethodologyes
dc.subjectReal network datasetses
dc.subjectData qualityes
dc.titleMethodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems [Póster]es
dc.typeinfo:eu-repo/semantics/conferenceObjectes
dc.type.versioninfo:eu-repo/semantics/publishedVersiones
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses
dc.publication.initialPage466es
dc.publication.endPage467es
dc.eventtitleJornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla)es
dc.eventinstitutionSevillaes
dc.relation.publicationplaceSevillaes

FicherosTamañoFormatoVerDescripción
JNIC24_484.pdf677.5KbIcon   [PDF] Ver/Abrir  

Este registro aparece en las siguientes colecciones

Mostrar el registro sencillo del ítem

Attribution-NonCommercial-NoDerivatives 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como: Attribution-NonCommercial-NoDerivatives 4.0 Internacional