Development and evaluation of a dataset generator tool for generating synthetic log files containing computer attack signatures

    Research output: Contribution to journalArticlepeer-review

    Abstract

    A key requirement for experimental analysis in the areas of network intrusion and computer forensics is the availability of suitable datasets. However, the inherent security and privacy issues surrounding these disciplines have resulted in a lack of available "test-bed" datasets for testing and evaluation purposes. Typically, the datasets required in these cases are from system log files, containing traces of computer misuse. Therefore, there is obvious potential for the use of synthetically generated log files that can accurately reproduce these traces or patterns of misuse. This paper discusses the development, testing, and evaluation of a dataset generator tool, designed to produce such datasets, particularly those containing patterns of common computer attacks.

    Original languageEnglish
    Pages (from-to)64-76
    Number of pages13
    JournalInternational Journal of Ambient Computing and Intelligence
    Volume3
    Issue number2
    DOIs
    Publication statusPublished - Apr 2011

    Keywords

    • Computer forensics
    • Data mining
    • Dataset generator
    • Experimental analysis
    • Intrusion detection

    Fingerprint

    Dive into the research topics of 'Development and evaluation of a dataset generator tool for generating synthetic log files containing computer attack signatures'. Together they form a unique fingerprint.

    Cite this