.
├── day-r5.2.csv.gz
├── subsession-nact25-r5.2.csv.gz
├── subsession-nact50-r5.2.csv.gz
├── session-r5.2.csv.gz
├── subsession-time120-r5.2.csv.gz
├── subsession-time240-r5.2.csv.gz
├── week-r5.2.csv.gz
└── license.txt
For more details, please see: github, and paper.
The files are provided as supplementary data to our papers [1], [2], [3]. Please see license.txt for the CERT insider threat test dataset copyright notices.
[1] D. C. Le and N. Zincir-Heywood, "Machine learning based Insider Threat Modelling and Detection," 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Arlington, VA, USA, 2019, pp. 1-6.
[2] D. C. Le, N. Zincir-Heywood and M. I. Heywood, "Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning," in IEEE Transactions on Network and Service Management, vol. 17, no. 1, pp. 30-44, March 2020, doi: 10.1109/TNSM.2020.2967721.
[3] D. C. Le and N. Zincir-Heywood, "Exploring anomalous behaviour detection and classification for insider threat identification," International Journal of Network Management, Mar. 2020.
tree v1.8.0 © 1996 - 2018 by Steve Baker and Thomas Moore
HTML output hacked and copyleft © 1998 by Francesc Rocher
JSON output hacked and copyleft © 2014 by Florian Sesser
Charsets / OS/2 support © 2001 by Kyosuke Tokoro