Jan. 3, 2022, 2:20 a.m. | Jorge Guerra, Carlos Catania, Eduardo Veas

cs.CR updates on arXiv.org arxiv.org

In contrast to previous surveys, the present work is not focused on reviewing
the datasets used in the network security field. The fact is that many of the
available public labeled datasets represent the network behavior just for a
particular time period. Given the rate of change in malicious behavior and the
serious challenge to label, and maintain these datasets, they become quickly
obsolete. Therefore, this work is focused on the analysis of current labeling
methodologies applied to network-based data. …

challenges labeling network traffic

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Consultant

@ Auckland Council | Central Auckland, NZ, 1010

Security Engineer, Threat Detection

@ Stripe | Remote, US

DevSecOps Engineer (Remote in Europe)

@ CloudTalk | Prague, Prague, Czechia - Remote

Security Architect

@ Valeo Foods | Dublin, Ireland

Security Specialist - IoT & OT

@ Wallbox | Barcelona, Catalonia, Spain