2023
DOI: 10.1109/tdsc.2022.3201582
|View full text |Cite
|
Sign up to set email alerts
|

Maintainable Log Datasets for Evaluation of Intrusion Detection Systems

Abstract: Intrusion detection systems (IDS) monitor system logs and network traffic to recognize malicious activities in computer networks. Evaluating and comparing IDSs with respect to their detection accuracies is thereby essential for their selection in specific use-cases. Despite a great need, hardly any labeled intrusion detection datasets are publicly available. As a consequence, evaluations are often carried out on datasets from real infrastructures, where analysts cannot control system parameters or generate a r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2024
2024
2025
2025

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 34 publications
0
3
0
Order By: Relevance
“…This section details the setup of our experiment, designed to assess the efficacy of our knowledge graph-based inference method for detecting network attacks. We utilized the AIT Log Dataset [57,58], an extensive repository of recorded data primarily comprising log files that offer valuable insights into artificial intelligence and technology-related phenomena. The dataset encompasses a substantial volume of authentic log data from diverse network systems, including web servers, intrusion detection systems (IDS), and user hosts.…”
Section: Experiments Setupmentioning
confidence: 99%
See 1 more Smart Citation
“…This section details the setup of our experiment, designed to assess the efficacy of our knowledge graph-based inference method for detecting network attacks. We utilized the AIT Log Dataset [57,58], an extensive repository of recorded data primarily comprising log files that offer valuable insights into artificial intelligence and technology-related phenomena. The dataset encompasses a substantial volume of authentic log data from diverse network systems, including web servers, intrusion detection systems (IDS), and user hosts.…”
Section: Experiments Setupmentioning
confidence: 99%
“…This section details the setup of our experiment, designed to assess the efficacy of our knowledge graph‐based inference method for detecting network attacks. We utilized the AIT Log Dataset [57, 58], an extensive repository of recorded data primarily comprising log files that offer valuable insights into artificial intelligence and technology‐related phenomena.…”
Section: Experiments Setupmentioning
confidence: 99%
“…These events include the uploading measurements, executing commands and login access to various devices. The primary objective of these audit logs are to support real-time functions for intrusion detection systems [2]. Furthermore, they play a vital role in data forensic [3] and identification of any misuse of the system carried out by the adversary.…”
mentioning
confidence: 99%