Datasets are not enough: Challenges in labeling network traffic

نویسندگان

چکیده

In contrast to previous surveys, the present work is not focused on reviewing datasets used in network security field. The fact that many of available public labeled represent behavior just for a particular time period. Given rate change malicious and serious challenge label, maintain these datasets, they become quickly obsolete. Therefore, this analysis current labeling methodologies applied network-based data. field security, process representative traffic dataset particularly challenging costly since very specialized knowledge required classify traces. Consequently, most methods are based automatic generation synthetic traces, which hides essential aspects necessary correct differentiation between normal behavior. Alternatively, few other incorporate non-experts users real with help visual statistical tools. However, after conducting an in-depth analysis, it seems all suffer from fundamental drawbacks regarding quality, volume, speed resulting dataset. This lack consistent continuously generating accurate validated methodology must be addressed by research community. Moreover, label condition helping acceptance novel detection approaches machine learning techniques.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Why Objects Are Not Enough

Object−oriented programming hasn't created a viable software component industry. From a technical perspective, the reason for this failure lies in an insufficient consideration of the unique requirements of component software. Object−oriented programming too often concentrates on individual objects, instead of whole collections of objects, i.e., components. Component−oriented programming requir...

متن کامل

How many traffic sources are enough?

A usual way of creating Long Range Dependent (LRD) traffic is by the superposition of on-off sources. The question that how many sources are enough to make a realistic Internet simulation, has not been theoretically explained till yet. It has now become relevant, as the simulation technology is faced with the challenge of simulating high speed networks. As traffic sources consume computing powe...

متن کامل

When Six Gates are Not Enough

We apply the pigeonhole principle to show that there must exist Boolean functions on 7 inputs with a multiplicative complexity of at least 7, i.e., that cannot be computed with only 6 multiplications in the Galois field with two elements.

متن کامل

Query Logs Alone are not Enough

The practice of guiding a search engine based on query logs observed from the engine's user population provides large volumes of data but potentially also sacrifices the privacy of the user. In this paper, we ask the following question: Is it possible, given rich instrumented data from a panel and usability study data, to observe complete information without routinely analyzing query logs? What...

متن کامل

Conservation biology: Genes are not enough

A study of correlated genotypic and phenotypic changes over a 2400-year period in a cave population of pocket gophers bolsters the idea that small, isolated populations can not only persist in a fluctuating environment, but may be able to adapt without genetic input from elsewhere.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers & Security

سال: 2022

ISSN: ['0167-4048', '1872-6208']

DOI: https://doi.org/10.1016/j.cose.2022.102810