Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments
DOI: 10.4018/978-1-4666-2041-4.ch011
|View full text |Cite
|
Sign up to set email alerts
|

Development and Evaluation of a Dataset Generator Tool for Generating Synthetic Log Files Containing Computer Attack Signatures

Abstract: A key requirement for experimental analysis in the areas of network intrusion and computer forensics is the availability of suitable datasets. However, the inherent security and privacy issues surrounding these disciplines have resulted in a lack of available “test-bed” datasets for testing and evaluation purposes. Typically, the datasets required in these cases are from system log files, containing traces of computer misuse. Therefore, there is obvious potential for the use of synthetically generated log file… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 3 publications
0
1
0
1
Order By: Relevance
“…Emplea técnicas de clasificación para la predicción del rendimiento de los estudiantes, establece criterios para el pre-procesamiento de datos y ajuste de algoritmos para resolver los problemas de calidad de los datos (Quinn & Gray, 2019;O'Shaughnessy & Gray, 2011;Gray et al, 2016).…”
Section: Principales Autoresunclassified
“…Emplea técnicas de clasificación para la predicción del rendimiento de los estudiantes, establece criterios para el pre-procesamiento de datos y ajuste de algoritmos para resolver los problemas de calidad de los datos (Quinn & Gray, 2019;O'Shaughnessy & Gray, 2011;Gray et al, 2016).…”
Section: Principales Autoresunclassified
“…Computer Forensics science is one kind of computer security technologies that analyzes what attackers have done, like sending computer viruses, malware and malicious codes, or issuing Distributed Denial-of-Service (DDoS for short) attacks. O'Shaughnessy et al [3] acquired particular network intrusion and attack patterns from a system log file. The datasets required are extracted from system log files, containing the traces of computer misuse.…”
Section: Related Researchmentioning
confidence: 99%