Ground truth data for anomaly detection in imbalance authentication logs.
-
Create a conda virtual environment
conda create --name imbalance-anomaly-gt python=3.6
-
Activate the environment
conda activate imbalance-anomaly-gt
-
Clone this repository
git clone https://github.com/studiawan/imbalance-anomaly-gt.git
-
Go to the project directory
cd imbalance-anomaly-gt
-
Install this package
pip install -e .
-
Extract casper-rw dataset
tar -xzvf datasets/casper-rw/all.log.tar.gz --directory datasets/casper-rw/
-
Extract dfrws-2009 dataset
tar -xzvf datasets/dfrws-2009/all.log.tar.gz --directory datasets/dfrws-2009/
-
Extract honeynet-challenge7 dataset
tar -xzvf datasets/honeynet-challenge7/all.log.tar.gz --directory datasets/honeynet-challenge7/
-
To build the ground truth, run this command
python imbalance-anomaly-gt/groundtruth.py $DATASET_NAME$
Example:
python imbalance-anomaly-gt/groundtruth.py dfrws-2009
-
The supported datasets are
casper-rw
,dfrws-2009
, andhoneynet-challenge7
-
The ground truth file is
log.all.pickle
and it is located in directorydatasets/$DATASET_NAME$
Garfinkel, S.: nps-2009-casper-rw: An ext3 file system from a bootable USB (2009), http://downloads.digitalcorpora.org/corpora/drives/nps-2009-casper-rw/
Casey, E., Richard III, G.G.: DFRWS Forensic Challenge 2009 (2009), http://old.dfrws.org/2009/challenge/index.shtml
Arcas, G., Gonzales, H., Cheng, J.: Challenge 7 of the Honeynet Project Forensic Challenge 2011 - Forensic analysis of a compromised server (2011), https://old.honeynet.org/challenges/2011_7_compromised_server