2021
DOI: 10.3390/electronics10060704
|View full text |Cite
|
Sign up to set email alerts
|

The Influences of Feature Sets on the Detection of Advanced Persistent Threats

Abstract: This paper investigates the influences of different statistical network traffic feature sets on detecting advanced persistent threats. The selection of suitable features for detecting targeted cyber attacks is crucial to achieving high performance and to address limited computational and storage costs. The evaluation was performed on a semi-synthetic dataset, which combined the CICIDS2017 dataset and the Contagio malware dataset. The CICIDS2017 dataset is a benchmark dataset in the intrusion detection field an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…e well-known network security public datasets CIC-IDS2017, CIC-IDS2018, and CIC-DDoS2019 are collected based on this feature extraction tool [33]. Due to its extensive application and good evaluation performance, CIC-FlowMeter has become one of the most effective collection tools for DDoS feature generation.…”
Section: Feature Generationmentioning
confidence: 99%
“…e well-known network security public datasets CIC-IDS2017, CIC-IDS2018, and CIC-DDoS2019 are collected based on this feature extraction tool [33]. Due to its extensive application and good evaluation performance, CIC-FlowMeter has become one of the most effective collection tools for DDoS feature generation.…”
Section: Feature Generationmentioning
confidence: 99%
“…Similar to a previous paper, [15], this work relies on two different datasets, namely, Contagio [37] and CICIDS2017 [38]. Whereas the former contains data on APT, the latter encompasses benign and attack data that resemble real-world data.…”
Section: Datasetsmentioning
confidence: 99%
“…This paper builds upon previous works from [14,15], where a novel two-stage approach for anomaly detection, relying on autoencoders, was introduced. In this work, we additionally investigated several anomaly-detection methods with an emphasis on filtering methods and performance evaluation on two datasets.…”
Section: Introductionmentioning
confidence: 97%