DetectLM
DetectLM copied to clipboard
Data set
Hello,
Very nice work! I have several questions about the data set used in this work. (I learned much about this work from this slide)
- Do you have the original format of the data (i.e. sequence of windows command execution with subcommands etc)?
- Do you have data regarding other attacks (other than those shown in the slide, APT10 etc)?
- Otherwise, could you share with me your methods of collecting training data?
Thank you very much! Seng Pei Liew
We have a lot of attack data due to incident response in many organizations. However, the original data contains infected organization information, it can not be published.