March 17, 2022, 1:20 a.m. | Max Landauer, Florian Skopik, Maximilian Frank, Wolfgang Hotwagner, Markus Wurzenberger, Andreas Rauber

cs.CR updates on arXiv.org arxiv.org

Intrusion detection systems (IDS) monitor system logs and network traffic to
recognize malicious activities in computer networks. Evaluating and comparing
IDSs with respect to their detection accuracies is thereby essential for their
selection in specific use-cases. Despite a great need, hardly any labeled
intrusion detection datasets are publicly available. As a consequence,
evaluations are often carried out on datasets from real infrastructures, where
analysts cannot control system parameters or generate a reliable ground truth,
or private datasets that prevent reproducibility …

detection intrusion intrusion detection log systems

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Staff DFIR Investigator

@ SentinelOne | United States - Remote

Senior Consultant.e (H/F) - Product & Industrial Cybersecurity

@ Wavestone | Puteaux, France

Information Security Analyst

@ StarCompliance | York, United Kingdom, Hybrid

Senior Cyber Security Analyst (IAM)

@ New York Power Authority | White Plains, US