2023
DOI: 10.1016/j.dib.2023.109512
|View full text |Cite
|
Sign up to set email alerts
|

The Westermo network traffic data set

Per Erik Strandberg,
David Söderman,
Alireza Dehlaghi-Ghadim
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 7 publications
(9 reference statements)
0
1
0
Order By: Relevance
“…The feature with the highest absolute coefficient for each principal component is the most relevant for that axis. Second, we showcase the architecture feature to handle training on different blocks of the SFI2 architecture using a Westermo dataset in our evaluation [20]. This dataset refers to 90 min of packet industrial network slicing, including harmless SSH, bad SSH, misconfigured IP addresses, duplicated IP addresses, port scans, and man-in-themiddle attacks.…”
Section: Ml-native Security -An Architectural Feature Orchestration Casementioning
confidence: 99%
“…The feature with the highest absolute coefficient for each principal component is the most relevant for that axis. Second, we showcase the architecture feature to handle training on different blocks of the SFI2 architecture using a Westermo dataset in our evaluation [20]. This dataset refers to 90 min of packet industrial network slicing, including harmless SSH, bad SSH, misconfigured IP addresses, duplicated IP addresses, port scans, and man-in-themiddle attacks.…”
Section: Ml-native Security -An Architectural Feature Orchestration Casementioning
confidence: 99%