{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:53Z","timestamp":1750220333609,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T00:00:00Z","timestamp":1650240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["833456"],"award-info":[{"award-number":["833456"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Austrian Research Promotion Agency","award":["868306,873980"],"award-info":[{"award-number":["868306,873980"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,18]]},"DOI":"10.1145\/3510547.3517924","type":"proceedings-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T14:13:59Z","timestamp":1651155239000},"page":"77-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation"],"prefix":"10.1145","author":[{"given":"Max","family":"Landauer","sequence":"first","affiliation":[{"name":"Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Maximilian","family":"Frank","sequence":"additional","affiliation":[{"name":"Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Florian","family":"Skopik","sequence":"additional","affiliation":[{"name":"Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Wolfgang","family":"Hotwagner","sequence":"additional","affiliation":[{"name":"Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Markus","family":"Wurzenberger","sequence":"additional","affiliation":[{"name":"Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Andreas","family":"Rauber","sequence":"additional","affiliation":[{"name":"Vienna University of Technology, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2022,4,28]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2940735"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2018.00132"},{"key":"e_1_3_2_2_3_1","volume-title":"Self-Propagating Malware. arXiv:2104.10034","author":"Buchanan Molly","year":"2021","unstructured":"Molly Buchanan , Jeffrey W Collyer , Jack W Davidson , Saikat Dey , Mark Gardner , Jason D Hiser , Jeffry Lang , Alastair Nottingham , and Alina Oprea . 2021. On Generating and Labeling Network Traffic with Realistic , Self-Propagating Malware. arXiv:2104.10034 ( 2021 ). Molly Buchanan, Jeffrey W Collyer, Jack W Davidson, Saikat Dey, Mark Gardner, Jason D Hiser, Jeffry Lang, Alastair Nottingham, and Alina Oprea. 2021. On Generating and Labeling Network Traffic with Realistic, Self-Propagating Malware. arXiv:2104.10034 (2021)."},{"key":"e_1_3_2_2_4_1","first-page":"217","article-title":"Towards a robust method of dataset generation of malicious activity for anomaly-based HIDS training and presentation of AWSCTD dataset","volume":"6","author":"Nikolaj Goranin Dainius","year":"2018","unstructured":"Dainius vC eponis and Nikolaj Goranin . 2018 . Towards a robust method of dataset generation of malicious activity for anomaly-based HIDS training and presentation of AWSCTD dataset . Baltic Journal of Modern Computing , Vol. 6 , 3 (2018), 217 -- 234 . Dainius vC eponis and Nikolaj Goranin. 2018. Towards a robust method of dataset generation of malicious activity for anomaly-based HIDS training and presentation of AWSCTD dataset. Baltic Journal of Modern Computing , Vol. 6, 3 (2018), 217--234.","journal-title":"Baltic Journal of Modern Computing"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"e_1_3_2_2_6_1","unstructured":"Maximilian Frank. 2021. Quality improvement of labels for model-driven benchmark data generation for intrusion detection systems. Master's Thesis.  Maximilian Frank. 2021. Quality improvement of labels for model-driven benchmark data generation for intrusion detection systems. Master's Thesis."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5673083"},{"key":"e_1_3_2_2_8_1","volume-title":"Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. arXiv:2010.13637","author":"Gao Peng","year":"2020","unstructured":"Peng Gao , Fei Shao , Xiaoyuan Liu , Xusheng Xiao , Zheng Qin , Fengyuan Xu , Prateek Mittal , Sanjeev R Kulkarni , and Dawn Song . 2020. Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. arXiv:2010.13637 ( 2020 ). Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R Kulkarni, and Dawn Song. 2020. Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. arXiv:2010.13637 (2020)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISSEC.2016.7885840"},{"key":"e_1_3_2_2_11_1","volume-title":"D Kreusel, and Simon Ganz.","author":"Grimmer Martin","year":"2019","unstructured":"Martin Grimmer , Martin Max R\u00f6hling , D Kreusel, and Simon Ganz. 2019 . A modern and sophisticated host based intrusion detection data set. IT-Sicherheit als Voraussetzung f\u00fcr eine erfolgreiche Digitalisierung ( 2019), 135--145. Martin Grimmer, Martin Max R\u00f6hling, D Kreusel, and Simon Ganz. 2019. A modern and sophisticated host based intrusion detection data set. IT-Sicherheit als Voraussetzung f\u00fcr eine erfolgreiche Digitalisierung (2019), 135--145."},{"key":"e_1_3_2_2_12_1","volume-title":"Loghub: a large collection of system log datasets towards automated log analytics. arXiv:2008.06448","author":"He Shilin","year":"2020","unstructured":"Shilin He , Jieming Zhu , Pinjia He , and Michael R Lyu . 2020. Loghub: a large collection of system log datasets towards automated log analytics. arXiv:2008.06448 ( 2020 ). Shilin He, Jieming Zhu, Pinjia He, and Michael R Lyu. 2020. Loghub: a large collection of system log datasets towards automated log analytics. arXiv:2008.06448 (2020)."},{"key":"e_1_3_2_2_13_1","volume-title":"Transfer Log-based Anomaly Detection with Pseudo Labels. In International Conference on Network and Service Management. IEEE, 1--5.","author":"Huang Shaohan","year":"2020","unstructured":"Shaohan Huang , Yi Liu , Carol Fung , Rong He , Yining Zhao , Hailong Yang , and Zhongzhi Luan . 2020 . Transfer Log-based Anomaly Detection with Pseudo Labels. In International Conference on Network and Service Management. IEEE, 1--5. Shaohan Huang, Yi Liu, Carol Fung, Rong He, Yining Zhao, Hailong Yang, and Zhongzhi Luan. 2020. Transfer Log-based Anomaly Detection with Pseudo Labels. In International Conference on Network and Service Management. IEEE, 1--5."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3031317"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2006.06.001"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.004"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2015.7333298"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16184-2_51"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.103"},{"key":"e_1_3_2_2_21_1","volume-title":"16th European Conference on Cyber Warfare and Security. 361--369","author":"Ring Markus","year":"2017","unstructured":"Markus Ring , Sarah Wunderlich , Dominik Gr\u00fcdl , Dieter Landes , and Andreas Hotho . 2017 . Flow-based benchmark data sets for intrusion detection . In 16th European Conference on Cyber Warfare and Security. 361--369 . Markus Ring, Sarah Wunderlich, Dominik Gr\u00fcdl, Dieter Landes, and Andreas Hotho. 2017. Flow-based benchmark data sets for intrusion detection. In 16th European Conference on Cyber Warfare and Security. 361--369."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.21817\/indjcse\/2019\/v10i5\/191005008"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890935"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Baltimore MD USA","acronym":"CODASPY '22"},"container-title":["Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510547.3517924","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510547.3517924","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:19Z","timestamp":1750191139000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510547.3517924"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,18]]},"references-count":27,"alternative-id":["10.1145\/3510547.3517924","10.1145\/3510547"],"URL":"https:\/\/doi.org\/10.1145\/3510547.3517924","relation":{},"subject":[],"published":{"date-parts":[[2022,4,18]]},"assertion":[{"value":"2022-04-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}