Penetration Test & Cyber Attacks Scenario: An Overview Operating System

Stiawan, Deris (2020) Penetration Test & Cyber Attacks Scenario: An Overview Operating System. [Experiment] (Unpublished)

[thumbnail of Dataset_ITD.pdf] Text
Dataset_ITD.pdf
Restricted to Registered users only

Download (261kB) | Request a copy

Abstract

Network intrusion detection research is one of the major field in network security. It motivates a large number of researchers doing research in this area to deal with the dynamic changes of intrusion techniques used. Unfortunately, the number of intrusion datasets that are publicly available are very limited. In most cases organization will not allow the data to become public for intrusion detection evaluation due to protecting their privacy. On the other hand, producing synthetic intrusion data is very time consuming, difficult and expensive. Reseachers require to have their own simulation lab, identify the procedures, intrusion tools and attack scripts to be used. This is the main reason why most of the researchers are still using the existing datasets which are released more than two decades ago. Those datasets do not contain new type ofattacks to make them viable for intrusion detection researches nowadays. A synthetic dataset called ITD-UTM that contains new series of Web 2.0 attacks has been developed at Network Research Lab and it is already publicly available. This paper examines Web 2.0 attacks patterns over the dataset. The dataset contributes to the intrusion detection research community towards a better understanding on WEB 2.0 threats for further improvement of detection techniques.

Item Type: Experiment
Subjects: Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation.
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Dr. Deris Stiawan
Date Deposited: 13 Jan 2021 05:56
Last Modified: 13 Jan 2021 05:56
URI: http://repository.unsri.ac.id/id/eprint/39267

Actions (login required)

View Item View Item