• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

来自共享平台的入侵检测警报数据集。

Dataset of intrusion detection alerts from a sharing platform.

作者信息

Husák Martin, Žádník Martin, Bartoš Václav, Sokol Pavol

机构信息

Institute of Computer Science, Masaryk University, Czech Republic.

CESNET, Czech Republic.

出版信息

Data Brief. 2020 Nov 17;33:106530. doi: 10.1016/j.dib.2020.106530. eCollection 2020 Dec.

DOI:10.1016/j.dib.2020.106530
PMID:33299907
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7701952/
Abstract

The dataset contains intrusion detection alerts obtained via an alert sharing platform (SABU) for one week. A plethora of heterogeneous intrusion detection systems deployed across several organizations contributed to the sharing platform. The alerts are stored in the intrusion Detection Extensible Alert (IDEA) format and categorized using the eCSIRT.net Incident Taxonomy. Dataset can be used in several areas of cybersecurity research for the analysis of intrusion detection alerts including temporal and spatial correlations, reputation scoring, attack scenario reconstruction, and attack projection. The network identifiers (e.g., IP addresses, hostnames) are anonymized. However, the list of interesting features (e.g., presence on blacklists, geolocation) of such entities at the time of data collection is provided.

摘要

该数据集包含通过警报共享平台(SABU)获取的一周内的入侵检测警报。多个组织部署的大量异构入侵检测系统为该共享平台提供了数据。警报以入侵检测可扩展警报(IDEA)格式存储,并使用eCSIRT.net事件分类法进行分类。该数据集可用于网络安全研究的多个领域,用于分析入侵检测警报,包括时间和空间相关性、声誉评分、攻击场景重建和攻击预测。网络标识符(如IP地址、主机名)已进行匿名处理。不过,提供了数据收集时此类实体的有趣特征列表(如在黑名单上的情况、地理位置)。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ef8a/7701952/a59caf7eac68/gr3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ef8a/7701952/1802f9177140/gr1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ef8a/7701952/8f5541f3097c/gr2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ef8a/7701952/a59caf7eac68/gr3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ef8a/7701952/1802f9177140/gr1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ef8a/7701952/8f5541f3097c/gr2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ef8a/7701952/a59caf7eac68/gr3.jpg

相似文献

1
Dataset of intrusion detection alerts from a sharing platform.来自共享平台的入侵检测警报数据集。
Data Brief. 2020 Nov 17;33:106530. doi: 10.1016/j.dib.2020.106530. eCollection 2020 Dec.
2
Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey.基于网络入侵检测系统的网络攻击预测及告警关联技术研究综述。
Sensors (Basel). 2022 Feb 15;22(4):1494. doi: 10.3390/s22041494.
3
Feature Selection Using Information Gain for Improved Structural-Based Alert Correlation.利用信息增益进行特征选择以改进基于结构的警报关联
PLoS One. 2016 Nov 28;11(11):e0166017. doi: 10.1371/journal.pone.0166017. eCollection 2016.
4
Frequency-Based Representation of Massive Alerts and Combination of Indicators by Heterogeneous Intrusion Detection Systems for Anomaly Detection.基于频率的海量警报表示和异构入侵检测系统的指标组合用于异常检测。
Sensors (Basel). 2022 Jun 10;22(12):4417. doi: 10.3390/s22124417.
5
Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks.无线传感器网络中合作分布式入侵检测方案的入侵感知警报验证算法。
Sensors (Basel). 2009;9(8):5989-6007. doi: 10.3390/s90805989. Epub 2009 Jul 28.
6
ROSIDS23: Network intrusion detection dataset for robot operating system.蔷薇类23:用于机器人操作系统的网络入侵检测数据集。
Data Brief. 2023 Oct 31;51:109739. doi: 10.1016/j.dib.2023.109739. eCollection 2023 Dec.
7
A Novel Radial Visualization of Intrusion Detection Alerts.一种新型的入侵检测警报径向可视化方法。
IEEE Comput Graph Appl. 2018 Nov-Dec;38(6):83-95. doi: 10.1109/MCG.2018.2879067.
8
The Proposition and Evaluation of the RoEduNet-SIMARGL2021 Network Intrusion Detection Dataset.RoEduNet-SIMARGL2021 网络入侵检测数据集的提出与评估。
Sensors (Basel). 2021 Jun 24;21(13):4319. doi: 10.3390/s21134319.
9
Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach.使用决策理论方法探讨多方利益相关者的网络安全信息共享观点。
Risk Anal. 2018 Feb;38(2):215-225. doi: 10.1111/risa.12878. Epub 2017 Aug 11.
10
Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach.迈向基于物联网的智能电网中的应用网络安全解决方案:入侵检测系统方法。
Sensors (Basel). 2019 Nov 14;19(22):4952. doi: 10.3390/s19224952.

引用本文的文献

1
Enhanced SqueezeNet model for detecting IoT-Bot attacks: A comprehensive approach.用于检测物联网机器人攻击的增强型SqueezeNet模型:一种综合方法。
MethodsX. 2025 Jul 10;15:103499. doi: 10.1016/j.mex.2025.103499. eCollection 2025 Dec.
2
Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey.基于网络入侵检测系统的网络攻击预测及告警关联技术研究综述。
Sensors (Basel). 2022 Feb 15;22(4):1494. doi: 10.3390/s22041494.