2021
DOI: 10.3390/electronics10212711
|View full text |Cite
|
Sign up to set email alerts
|

Dataset Generation for Development of Multi-Node Cyber Threat Detection Systems

Abstract: This paper presents a new approach to generate datasets for cyber threat research in a multi-node system. For this purpose, the proof-of-concept of such a system is implemented. The system will be used to collect unique datasets with examples of information hiding techniques. These techniques are not present in publicly available cyber threat detection datasets, while the cyber threats that use them represent an emerging cyber defense challenge worldwide. The network data were collected thanks to the developme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…The trend is shifting towards analyzing existing cyber threat cases and replicating network traffic to reproduce them in cyberspace [22]. Vishwanath et al designed a method for stochastic generation of network traffic, duplication of actual network traffic, and delivering commands to test network applications [23], while Bieniasz et al proposed an approach for creating datasets for researching cyber threats on multi-node systems [24]. Thus, international research has been conducted on techniques to classify normal/abnormal traffic in a cyber training environment based on existing threat cases, and there is a need to build automated cyber training grounds through research on network traffic classification techniques.…”
Section: A Network Traffic Classification In Cyber Trainingmentioning
confidence: 99%
“…The trend is shifting towards analyzing existing cyber threat cases and replicating network traffic to reproduce them in cyberspace [22]. Vishwanath et al designed a method for stochastic generation of network traffic, duplication of actual network traffic, and delivering commands to test network applications [23], while Bieniasz et al proposed an approach for creating datasets for researching cyber threats on multi-node systems [24]. Thus, international research has been conducted on techniques to classify normal/abnormal traffic in a cyber training environment based on existing threat cases, and there is a need to build automated cyber training grounds through research on network traffic classification techniques.…”
Section: A Network Traffic Classification In Cyber Trainingmentioning
confidence: 99%
“…Bieniasz et al [10] proposed a new approach to generating datasets for cyber threat research in a multi-node system. Towards this purpose, the proof-of-concept of such a system was implemented and could be used to collect unique datasets with examples of information hiding techniques.…”
mentioning
confidence: 99%