计算机科学
代理(哲学)
竞赛(生物学)
数据科学
计算机安全
数据挖掘
生态学
生物
认识论
哲学
作者
Guige Ouyang,Yalin Huang,Chenhao Zhang
摘要
We witnessed a lot of examples of cases launched by Advanced Persistent Threat (APT) organization and the spectacular destructive power. The realistic data originate from occurred attack events almost is not available. Fortunately, there is some simulation dataset. Many previous works were chosen to evaluate their method on the Defense Advanced Research Projects Agency (DARPA) Transparent Computing Engagement 3 dataset that contains attack behaviors implemented by a highly skilled team. Meanwhile, with the rapid update development of computer technology and the competition between detection means and attacking methods is becoming increasingly fierce, this dataset is outmoded, it exists the enormous gap between current cyber attacks and the DARPA TC E3 dataset. In this work, we provide the statistical information of DARPA TC E5 and compare it with DARPA TC E3. We analyze the practicality of the more advanced DARPA Transparent Computing Engagement 5 dataset.
科研通智能强力驱动
Strongly Powered by AbleSci AI