Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research

by   Md. Monowar Anjum, et al.

Maintaining security and privacy in real-world enterprise networks is becoming more and more challenging. Cyber actors are increasingly employing previously unreported and state-of-the-art techniques to break into corporate networks. To develop novel and effective methods to thwart these sophisticated cyberattacks, we need datasets that reflect real-world enterprise scenarios to a high degree of accuracy. However, precious few such datasets are publicly available. Researchers still predominantly use the decade-old KDD datasets, however, studies showed that these datasets do not adequately reflect modern attacks like Advanced Persistent Threats(APT). In this work, we analyze the usefulness of the recently introduced DARPA Operationally Transparent Cyber (OpTC) dataset in this regard. We describe the content of the dataset in detail and present a qualitative analysis. We show that the OpTC dataset is an excellent candidate for advanced cyber threat detection research while also highlighting its limitations. Additionally, we propose several research directions where this dataset can be useful.



There are no comments yet.


page 5


Research Directions in Cyber Threat Intelligence

Cyber threat intelligence is a relatively new field that has grown from ...

A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights

Cyberspace is full of uncertainty in terms of advanced and sophisticated...

Automated Dataset Generation System for Collaborative Research of Cyber Threat Intelligence Analysis

The objectives of cyber attacks are becoming sophisticated and the attac...

Advanced Persistent Threat: Detection and Defence

The critical assessment presented within this paper explores existing re...

DeepTaskAPT: Insider APT detection using Task-tree based Deep Learning

APT, known as Advanced Persistent Threat, is a difficult challenge for c...

Metrics Towards Measuring Cyber Agility

In cyberspace, evolutionary strategies are commonly used by both attacke...

ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection

We present ANUBIS, a highly effective machine learning-based APT detecti...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.