TY - CONF T1 - On the Comparison of Network Attack Datasets: An Empirical Analysis Y1 - 2008 A1 - Berthier,R. A1 - Korman,D. A1 - Michel Cukier A1 - Hiltunen,M. A1 - Vesonder,G. A1 - Sheleheda,D. KW - ATLAS KW - distributed network telescope KW - Internet KW - intrusion detection systems KW - network attack datasets KW - network malicious activity KW - network security operators KW - security of data AB - Network malicious activity can be collected and reported by various sources using different attack detection solutions. The granularity of these solutions provides either very detailed information (intrusion detection systems, honeypots) or high-level trends (CAIDA, SANS). The problem for network security operators is often to select the sources of information to better protect their network. How much information from these sources is redundant and how much is unique? The goal of this paper is to show empirically that while some global attack events can be correlated across various sensors, the majority of incoming malicious activity has local specificities. This study presents a comparative analysis of four different attack datasets offering three different levels of granularity: 1) two high interaction honeynets deployed at two different locations (i.e., a corporate and an academic environment); 2) ATLAS which is a distributed network telescope from Arbor; and 3) Internet Protecttrade which is a global alerting service from AT amp;T. M3 - 10.1109/HASE.2008.50 ER -