Falsifiability of Network Security Research: The Good, the Bad, and the Uglyстатья

Информация о цитировании статьи получена из Scopus
Дата последнего поиска статьи во внешних источниках: 28 мая 2015 г.

Работа с статьей

Прикрепленные файлы

Имя Описание Имя файла Размер Добавлен
1. Полный текст TRUST_2014_submission_5.pdf 121,3 КБ 10 мая 2015 [gamajun]

[1] Gamayunov D. Falsifiability of network security research: The good, the bad, and the ugly // Proceedings of the 1st ACM SIGPLAN Workshop on Reproducible Research Methodologies and New Publication Models in Computer Engineering. — TRUST ’14. — ACM New York, NY, USA, 2014. — P. 4:1–4:3. A falsifiability criterion helps us to distinguish between scientific and non-scientific theories. One may try to raise a question whether this criterion is applicable to the information security research, especially to the intrusion detection and malware research fields. In fact, these research fields seems to fail to satisfy the falsifiability criterion, since they lack the practice of publishing raw experimental data which were used to prove the theories. Existing public datasets like the KDD Cup'99 dataset and VX Heavens virus dataset are outdated. Furthermore, most of current scientific research projects tend to keep their datasets private. We suggest that the scientific community should pay more attention to creating and maintaining public open datasets of malware and any kinds of computer attack-related data. But how can we bring this into reality, taking into account legal and privacy concerns? [ DOI ]

Публикация в формате сохранить в файл сохранить в файл сохранить в файл сохранить в файл сохранить в файл сохранить в файл скрыть