Towards the deployment of machine learning solutions in network traffic classification: A systematic survey

F Pacheco, E Exposito, M Gineste… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Traffic analysis is a compound of strategies intended to find relationships, patterns,
anomalies, and misconfigurations, among others things, in Internet traffic. In particular, traffic …

Automatic network intrusion detection: Current techniques and open issues

CA Catania, CG Garino - Computers & Electrical Engineering, 2012 - Elsevier
Automatic network intrusion detection has been an important research topic for the last
20years. In that time, approaches based on signatures describing intrusive behavior have …

Toward developing a systematic approach to generate benchmark datasets for intrusion detection

A Shiravi, H Shiravi, M Tavallaee, AA Ghorbani - computers & security, 2012 - Elsevier
In network intrusion detection, anomaly-based approaches in particular suffer from accurate
evaluation, comparison, and deployment which originates from the scarcity of adequate …

Bridging the gap: A pragmatic approach to generating insider threat data

J Glasser, B Lindauer - 2013 IEEE Security and Privacy …, 2013 - ieeexplore.ieee.org
The threat of malicious insider activity continues to be of paramount concern in both the
public and private sectors. Though there is great interest in advancing the state of the art in …

A model-driven framework for guided design space exploration

Á Hegedüs, Á Horváth, D Varró - Automated Software Engineering, 2015 - Springer
Abstract Design space exploration (DSE) aims at searching through various models
representing different design candidates to support activities like configuration design of …

Marionette: A programmable network traffic obfuscation system

KP Dyer, SE Coull, T Shrimpton - 24th USENIX Security Symposium …, 2015 - usenix.org
Recently, a number of obfuscation systems have been developed to aid in censorship
circumvention scenarios where encrypted network traffic is filtered. In this paper, we present …

Are we missing labels? A study of the availability of ground-truth in network security research

S Abt, H Baier - 2014 third international workshop on building …, 2014 - ieeexplore.ieee.org
Network security is a long-lasting field of research constantly encountering new challenges.
Inherently, research in this field is highly data-driven. Specifically, many approaches employ …

Reproducible and adaptable log data generation for sound cybersecurity experiments

R Uetz, C Hemminghaus, L Hackländer… - Proceedings of the 37th …, 2021 - dl.acm.org
Artifacts such as log data and network traffic are fundamental for cybersecurity research, eg,
in the area of intrusion detection. Yet, most research is based on artifacts that are not …

[PDF][PDF] Generating Test Data for Insider Threat Detectors.

B Lindauer, J Glasser, M Rosen, KC Wallnau… - J. Wirel. Mob. Networks …, 2014 - isyou.info
The threat of malicious insider activity continues to be of paramount concern in both the
public and private sectors. Though there is great interest in advancing the state of the art in …

A novel approach for generating synthetic datasets for digital forensics

T Göbel, T Schäfer, J Hachenberger, J Türr… - Advances in Digital …, 2020 - Springer
Increases in the quantity and complexity of digital evidence necessitate the development
and application of advanced, accurate and efficient digital forensic tools. Digital forensic tool …