A Novel Approach for Generating Synthetic Datasets for Digital Forensics
暂无分享,去创建一个
Harald Baier | Jan Türr | Thomas Göbel | Thomas Schäfer | Julien Hachenberger | Harald Baier | Thomas Göbel | Jan Türr | J. Hachenberger | Thomas Schäfer
[1] Xiaoyu Du,et al. EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution , 2017, Digit. Investig..
[2] Andreas Hotho,et al. A Survey of Network-based Intrusion Detection Data Sets , 2019, Comput. Secur..
[3] Charles V. Wright,et al. Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security , 2010, RAID.
[4] Frank Breitinger,et al. Availability of datasets for digital forensics - And what is missing , 2017, Digit. Investig..
[5] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.
[6] Mike Hibler,et al. Large-scale Virtualization in the Emulab Network Testbed , 2008, USENIX ATC.
[7] Sebastian Abt,et al. Are We Missing Labels? A Study of the Availability of Ground-Truth in Network Security Research , 2014, 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).
[8] Felix C. Freiling,et al. The Forensic Image Generator Generator (Forensig2) , 2009, 2009 Fifth International Conference on IT Security Incident Management and IT Forensics.
[9] Felix C. Freiling,et al. Evaluating the Forensic Image Generator Generator , 2011, ICDF2C.
[10] Jesse C. Rabek,et al. LARIAT: Lincoln adaptable real-time information assurance testbed , 2002, Proceedings, IEEE Aerospace Conference.
[11] Paul Douglas,et al. Automatic Creation of Computer Forensic Test Images , 2012, IWCF.
[12] Martin May,et al. FLAME: A Flow-Level Anomaly Modeling Engine , 2008, CSET.
[13] Sándor Molnár,et al. How to validate traffic generators? , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).
[14] Max Mühlhäuser,et al. ID2T: A DIY dataset creation toolkit for Intrusion Detection Systems , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[15] Yufei Wang,et al. Characterization of Internet Traffic and User Classification: Foundations for the Next Generation of Network Emulation , 2002 .