Network Intrusion Datasets Used in Network Security Education

International Journal on Integrating Technology in Education (IJITE)


ISSN: 2320 - 1886(Online; 2320 - 3935(Print)

Network Intrusion Datasets Used in Network Security Education 

Alia Yahia1 and Eric Atwell2

1Sudan University of Science and Technology, Khartoum, Sudan
2University of Leeds, Leeds, UK

ABSTRACT

There is a gap between the network security graduate and the professional life. In this paper we discussed the different types of network intrusion dataset and then we highlighted the fact that any student can easily create a network intrusion dataset that is representative of the network they are in. Intrusions can be in form of anomaly or network signature; the students cannot grasp all types but they have to have the ability to detect malicious packets within his network. 





Comments

Popular posts from this blog

ONLINE VERSUS FACE-TO-FACE LEARNING: STUDENTS’ PREFERENCES DURING CRISIS TIMES

5th International Conference on Education and Integrating Technology (EDTECH 2024)

2nd International Conference on Education & Integrating Technology (EDIT 2024)