Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research

03/04/2021
by   Md. Monowar Anjum, et al.
0

Maintaining security and privacy in real-world enterprise networks is becoming more and more challenging. Cyber actors are increasingly employing previously unreported and state-of-the-art techniques to break into corporate networks. To develop novel and effective methods to thwart these sophisticated cyberattacks, we need datasets that reflect real-world enterprise scenarios to a high degree of accuracy. However, precious few such datasets are publicly available. Researchers still predominantly use the decade-old KDD datasets, however, studies showed that these datasets do not adequately reflect modern attacks like Advanced Persistent Threats(APT). In this work, we analyze the usefulness of the recently introduced DARPA Operationally Transparent Cyber (OpTC) dataset in this regard. We describe the content of the dataset in detail and present a qualitative analysis. We show that the OpTC dataset is an excellent candidate for advanced cyber threat detection research while also highlighting its limitations. Additionally, we propose several research directions where this dataset can be useful.

READ FULL TEXT
research
01/18/2020

Research Directions in Cyber Threat Intelligence

Cyber threat intelligence is a relatively new field that has grown from ...
research
10/29/2021

A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights

Cyberspace is full of uncertainty in terms of advanced and sophisticated...
research
11/25/2018

Automated Dataset Generation System for Collaborative Research of Cyber Threat Intelligence Analysis

The objectives of cyber attacks are becoming sophisticated and the attac...
research
04/22/2020

Advanced Persistent Threat: Detection and Defence

The critical assessment presented within this paper explores existing re...
research
10/31/2022

Do You Really Need to Disguise Normal Servers as Honeypots?

A honeypot, which is a kind of deception strategy, has been widely used ...
research
06/12/2019

Metrics Towards Measuring Cyber Agility

In cyberspace, evolutionary strategies are commonly used by both attacke...
research
12/21/2021

ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection

We present ANUBIS, a highly effective machine learning-based APT detecti...

Please sign up or login with your details

Forgot password? Click here to reset