figshare
Browse

attack_error_latencies

conference contribution
posted on 2024-08-22, 15:33 authored by Tommaso PuccettiTommaso Puccetti

time_series_latency

This repository includes all the codes used for the paper:

Detection Latencies of Anomaly Detectors: An Overlooked Perspective?

1) Step1. We collect two public datasets: ROSPaCe, and Arancino. The first is a dataset for intrusion detection composed by monitoring an embedded system on normal behavior and under attack. The second is specific for error detection and it represents an embedded system in an Internet of Things setting. Both datasets are time series-based and comprise a set of sequences of variable length.

2) Step2. We preprocess each dataset to extract sequences and shuffle their order. Note that we do not alter the order of data points within each sequence.

3) Step3. We select 5 representative detectors from the state-of-the-art solutions reviewed and organized into algorithms for unordered data points and algorithms for ordered data points.

4) Step4. We split the two datasets into train, validation, and test sets, using 60% of sequences for the training, 30% for the test, and 10% for validation. We train the selected detectors on each dataset.

5) Step5. We evaluate the models using state-of-the-art metrics and our proposed metrics.

Check README file inside the repositories in the getting_started.zip and all_experiments.zip.

Funding

This paper was partially supported by the MUR PRIN 2022 project FLEGREA - Federated Learning for Generative Emulation of Advanced Persistent Threats

SERICS (PE00000014) under the MUR National Recovery and Resilience Plan funded by the European Union - NextGenerationEU

History

Usage metrics

    Licence

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC