A Novel Approach for Generating Synthetic Datasets for Digital Forensics

[1]  Xiaoyu Du,et al.  EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution , 2017, Digit. Investig..

[2]  Andreas Hotho,et al.  A Survey of Network-based Intrusion Detection Data Sets , 2019, Comput. Secur..

[3]  Charles V. Wright,et al.  Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security , 2010, RAID.

[4]  Frank Breitinger,et al.  Availability of datasets for digital forensics - And what is missing , 2017, Digit. Investig..

[5]  Philip K. Chan,et al.  An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.

[6]  Mike Hibler,et al.  Large-scale Virtualization in the Emulab Network Testbed , 2008, USENIX ATC.

[7]  Sebastian Abt,et al.  Are We Missing Labels? A Study of the Availability of Ground-Truth in Network Security Research , 2014, 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

[8]  Felix C. Freiling,et al.  The Forensic Image Generator Generator (Forensig2) , 2009, 2009 Fifth International Conference on IT Security Incident Management and IT Forensics.

[9]  Felix C. Freiling,et al.  Evaluating the Forensic Image Generator Generator , 2011, ICDF2C.

[10]  Jesse C. Rabek,et al.  LARIAT: Lincoln adaptable real-time information assurance testbed , 2002, Proceedings, IEEE Aerospace Conference.

[11]  Paul Douglas,et al.  Automatic Creation of Computer Forensic Test Images , 2012, IWCF.

[12]  Martin May,et al.  FLAME: A Flow-Level Anomaly Modeling Engine , 2008, CSET.

[13]  Sándor Molnár,et al.  How to validate traffic generators? , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).

[14]  Max Mühlhäuser,et al.  ID2T: A DIY dataset creation toolkit for Intrusion Detection Systems , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[15]  Yufei Wang,et al.  Characterization of Internet Traffic and User Classification: Foundations for the Next Generation of Network Emulation , 2002 .