Development and Evaluation of a Dataset Generator Tool for Generating Synthetic Log Files Containing Computer Attack Signatures
Stephen O’Shaughnessy and
Geraldine Gray
Additional contact information
Stephen O’Shaughnessy: Institute of Technology Blanchardstown, Ireland
Geraldine Gray: Institute of Technology Blanchardstown, Ireland
International Journal of Ambient Computing and Intelligence (IJACI), 2011, vol. 3, issue 2, 64-76
Abstract:
A key requirement for experimental analysis in the areas of network intrusion and computer forensics is the availability of suitable datasets. However, the inherent security and privacy issues surrounding these disciplines have resulted in a lack of available “test-bed” datasets for testing and evaluation purposes. Typically, the datasets required in these cases are from system log files, containing traces of computer misuse. Therefore, there is obvious potential for the use of synthetically generated log files that can accurately reproduce these traces or patterns of misuse. This paper discusses the development, testing, and evaluation of a dataset generator tool, designed to produce such datasets, particularly those containing patterns of common computer attacks.
Date: 2011
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 4018/jaci.2011040105 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jaci00:v:3:y:2011:i:2:p:64-76
Access Statistics for this article
International Journal of Ambient Computing and Intelligence (IJACI) is currently edited by Nilanjan Dey
More articles in International Journal of Ambient Computing and Intelligence (IJACI) from IGI Global
Bibliographic data for series maintained by Journal Editor ().