2022
DOI: 10.3390/data7020022
|View full text |Cite
|
Sign up to set email alerts
|

The Comparison of Cybersecurity Datasets

Abstract: Almost all industrial internet of things (IIoT) attacks happen at the data transmission layer according to a majority of the sources. In IIoT, different machine learning (ML) and deep learning (DL) techniques are used for building the intrusion detection system (IDS) and models to detect the attacks in any layer of its architecture. In this regard, minimizing the attacks could be the major objective of cybersecurity, while knowing that they cannot be fully avoided. The number of people resisting the attacks an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 52 publications
0
7
0
Order By: Relevance
“…In any case, the datasets used in the state-of-the-art literature are appropriate for improving the wide range of algorithms arising from new research, but will not be able to generate new and tailored samples for explorations where more specific information is needed [ 18 ].…”
Section: Aim and Motivation—the Problem With Cyber Threat Datasetsmentioning
confidence: 99%
“…In any case, the datasets used in the state-of-the-art literature are appropriate for improving the wide range of algorithms arising from new research, but will not be able to generate new and tailored samples for explorations where more specific information is needed [ 18 ].…”
Section: Aim and Motivation—the Problem With Cyber Threat Datasetsmentioning
confidence: 99%
“…Standard risk analysis processes have been vulnerable for insurance companies due to the lack of recorded claims data [30]. [12] All industrial internet of things (IIoT) attacks happen at the information transmission layer, contrary to most references.…”
Section: Literature Reviewmentioning
confidence: 99%
“… Like much of the state-of-the-art, CYSAS-S3 provides a large amount of Metadata . Among the different collections surveyed, CYSAS-S3 is the only one that combines host, network and Mission (operation line) traces dependent on the above domains [ 72 ]. CYSAS-S3 is the only one in which the cyber Kill-Chains are clearly visible; …”
Section: Design Principlesmentioning
confidence: 99%
“…Among the different collections surveyed, CYSAS-S3 is the only one that combines host, network and Mission (operation line) traces dependent on the above domains [ 72 ].…”
Section: Design Principlesmentioning
confidence: 99%