2023
DOI: 10.1016/j.comnet.2023.109688
|View full text |Cite
|
Sign up to set email alerts
|

Unraveled — A semi-synthetic dataset for Advanced Persistent Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…In this work, we chose the NSL-KDD dataset as it is one of the most widely used datasets carrying individual attack vectors that make a good study for our analysis in terms of generating the data using GANs. The later datasets such as CIC-IDS2017 [160], CIC-DDoS2019 [161], DAPT2020 [108], Unraveled (DAPT2021) [109], and CICEV2023 [162] carry attack vectors with complex correlated features. As a future work, we intend to study the capabilities of GANs in generative complex attacks like DDoS, SQL-Injection, and cross-site scripting using various generative models like LLMs and GANs.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this work, we chose the NSL-KDD dataset as it is one of the most widely used datasets carrying individual attack vectors that make a good study for our analysis in terms of generating the data using GANs. The later datasets such as CIC-IDS2017 [160], CIC-DDoS2019 [161], DAPT2020 [108], Unraveled (DAPT2021) [109], and CICEV2023 [162] carry attack vectors with complex correlated features. As a future work, we intend to study the capabilities of GANs in generative complex attacks like DDoS, SQL-Injection, and cross-site scripting using various generative models like LLMs and GANs.…”
Section: Discussionmentioning
confidence: 99%
“…Alternative approaches to creating a dataset have been proposed in the literature, including semi-synthetic and synthetic data generation techniques. In the semi-synthetic data generation approach, a network is set up, simulating a realistic network topology, and human penetration testers penetrate the network [108,109]. The dataset is then built by capturing the normal user behavior and the simulated attack behavior, followed by appropriately labeling those behaviors for developing statistical and machine learning models.…”
Section: Generating Cyberattack Data Using Generative Modelsmentioning
confidence: 99%
“…For rapid processing, the stored data is required to be in structured form. This will help the system to process data retrieval commands quickly [10]. Beyond fundamentals of storage policies, CRC-NIDS desires to make a strategic function for its own pre-defined rules management [11].…”
Section: Database Valuations Over Nidsmentioning
confidence: 99%
“…There is a lack of robust attack datasets that can help detect sophisticated attacks, such as APTs [ 6 , 39 ]. The use of deception-based attacks for some recent datasets, such as DAPT2020 [ 40 ] and Unraveled [ 41 ], targeted a general class of APT attacks, by simulating the threat vectors used in APT attacks. As the scale of web infrastructure and web technologies expands, it will become difficult for security researchers to generate real attack samples by using attack simulations.…”
Section: Related Workmentioning
confidence: 99%
“…As the scale of web infrastructure and web technologies expands, it will become difficult for security researchers to generate real attack samples by using attack simulations. This research proposes complementing datasets such as DAPT2020 [ 40 ], and Unraveled [ 41 ], by generating fake attack data from real attack samples. GANs can create adversarial examples that mimic sophisticated attack techniques, as we have demonstrated in this research.…”
Section: Related Workmentioning
confidence: 99%