2020
DOI: 10.1007/978-3-030-59621-7_8
|View full text |Cite
|
Sign up to set email alerts
|

DAPT 2020 - Constructing a Benchmark Dataset for Advanced Persistent Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(19 citation statements)
references
References 30 publications
0
14
0
1
Order By: Relevance
“…However, APT attacks occur in internal networks as well. In addition, due to their artificial nature, the generic datasets do not exactly reflect a real-world environment [20]. In general, it is very difficult to distinguish between the behaviour of a benign user and an attacker.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, APT attacks occur in internal networks as well. In addition, due to their artificial nature, the generic datasets do not exactly reflect a real-world environment [20]. In general, it is very difficult to distinguish between the behaviour of a benign user and an attacker.…”
Section: Related Workmentioning
confidence: 99%
“…This method represents a multi-stage approach that relies on the observed network traffic. In addition, the authors of [20] propose a new dataset and benchmark existing anomalydetection models on that dataset. According to the performance, they claim that the reliable detection of APT attacks proved to be very difficult.…”
Section: Related Workmentioning
confidence: 99%
“…In [20], Myneni et al proposed a dataset to study APT and for the development of machine learning technologies suitable for APT attack detection. During the period of the logs' capture, an internal Red Team has been engaged.…”
Section: Apt-like Actors Observation On Dedicated Platformmentioning
confidence: 99%
“…(3) Superiority of the attention mechanism: we compare the detection performance of our attention mechanism for the different low-order correlations with the directly spliced method for the correlations [32] and the wired network intrusion datasets of NSL-KDD [33], UNSW-NB15 [34], CICIDS 2017 [35], CICIDS 2018 [36], and DAPT 2020 for APT [37] to evaluate the model.…”
Section: Model Evaluationmentioning
confidence: 99%