Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research

被引:12
作者
Anjum, Md. Monowar [1 ]
Iqbal, Shahrear [1 ]
Hamelin, Benoit [2 ]
机构
[1] CNR, Fredericton, NB, Canada
[2] Tutte Inst Math & Comp, Ottawa, ON, Canada
来源
PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2021 | 2021年
关键词
Cybersecurity Dataset; Intrusion Detection; Event Log;
D O I
10.1145/3450569.3463573
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Maintaining security and privacy in real-world enterprise networks is becoming more and more challenging. Cyber actors are increasingly employing previously unreported and state-of-the-art techniques to break into corporate networks. To develop novel and effective methods to thwart these sophisticated cyber attacks, we need datasets that reflect real-world enterprise scenarios to a high degree of accuracy. However, precious few such datasets are publicly available. Researchers still predominantly use the decade-old KDD datasets, however, studies showed that these datasets do not adequately reflect modern attacks like Advanced Persistent Threats (APT). In this work, we analyze the usefulness of the recently introduced DARPA Operationally Transparent Cyber (OpTC) dataset in this regard. We describe the content of the dataset in detail and present a qualitative analysis. We show that the OpTC dataset is an excellent candidate for advanced cyber threat detection research while also highlighting its limitations. Additionally, we propose several research directions where this dataset can be useful.
引用
收藏
页码:27 / 32
页数:6
相关论文
共 20 条
  • [1] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31
  • [2] Graph based anomaly detection and description: a survey
    Akoglu, Leman
    Tong, Hanghang
    Koutra, Danai
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 2015, 29 (03) : 626 - 688
  • [3] A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities
    Alshamrani, Adel
    Myneni, Sowmya
    Chowdhary, Ankur
    Huang, Dijiang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1851 - 1877
  • [4] [Anonymous], 2015, Comprehensive, Multi-Source Cyber-Security Events
  • [5] A systematic study of the class imbalance problem in convolutional neural networks
    Buda, Mateusz
    Maki, Atsuto
    Mazurowski, Maciej A.
    [J]. NEURAL NETWORKS, 2018, 106 : 249 - 259
  • [6] DARPA, 2019, Transparent Computing, TA5.1 Final Report Engagement 5
  • [7] DARPA, 2019, Operationally Transparent Cyber Dataset
  • [8] Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data
    Glasser, Joshua
    Lindauer, Brian
    [J]. IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 98 - 104
  • [9] Han XY, 2020, Arxiv, DOI arXiv:2001.01525
  • [10] Han Xueyuan, 2018, 10 USENIX WORKSH THE