Mostrar el registro sencillo del ítem

dc.contributor.authorPérez Sánchez, Antonioes-ES
dc.contributor.authorPalacios Hielscher, Rafaeles-ES
dc.contributor.authorLópez López, Gregorioes-ES
dc.date.accessioned2025-07-16T12:21:26Z
dc.date.available2025-07-16T12:21:26Z
dc.date.issued2025-08-01es_ES
dc.identifier.issn2352-3409es_ES
dc.identifier.urihttps:doi.org10.1016j.dib.2025.111723es_ES
dc.identifier.urihttp://hdl.handle.net/11531/101259
dc.descriptionArtículos en revistases_ES
dc.description.abstractes-ES
dc.description.abstractThe evaluation of threat detection and prevention systems requires the use of datasets that are up-to-date and correctly designed according to the most common threats. Currently, the availability of event datasets containing sufficient information to perform these analyses on Microsoft Windows systems is practically non-existent. In the background section we summarize the existing datasets, highlighting their main limitations to conduct studies of threat detection. Following we present COMISET, the dataset we have generated through the collection of events in real time and updated according to the current threats and malware obfuscation techniques. The main advantage of using this dataset with respect to those already available is that it was developed specifically for the evaluation of threat detection and prevention systems, and the events were labelled according to techniques and tactics of the MITRE ATT&CK matrix. COMISET is freely available for research purposes and contains about 250 million events of both malicious and non-malicious types. To create the dataset the experiments have been performed in two different scenarios: a laboratory emulating the infrastructure of a small company, and a computer network commonly used by students at Comillas University. In the laboratory environment, real attacks were executed involving a variety of techniques and tactics commonly used by the adversaries. The monitoring system was able to capture the events and label them according to the MITRE ATT&CK matrix. Some of these events are shown in this paper as an example of the worthy information contained in the dataset. en-GB
dc.language.isoen-GBes_ES
dc.sourceRevista: Data in Brief, Periodo: 1, Volumen: online, Número: , Página inicial: 111723-1, Página final: 111723-9es_ES
dc.subject.otherInstituto de Investigación Tecnológica (IIT)es_ES
dc.titleCOMISET: Dataset for the analysis of malicious events in Windows systemses_ES
dc.typeinfo:eu-repo/semantics/articlees_ES
dc.description.versioninfo:eu-repo/semantics/publishedVersiones_ES
dc.rights.holderes_ES
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses_ES
dc.keywordses-ES
dc.keywordsEvent-based threat detection; MITRE ATT&CK; Cyber kill chain; Advanced persistent threatsen-GB


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

  • Artículos
    Artículos de revista, capítulos de libro y contribuciones en congresos publicadas.

Mostrar el registro sencillo del ítem