Research Article
Deep Learning Approaches for Predictive Masquerade Detection
Table 2
Datasets and their characteristics.
| Dataset Name | Hosts Platform | No. of Users | Audit Format | Enriched? | Contaminated? | Sessions? | Real Masquerades? | Year |
| SEA | Unix | 50 | Unix Commands | No | Yes | No | No | 2001 |
| Greenberg | Unix | 168 | Unix Commands | Yes | No | Yes | No | 1988 |
| PU | Unix | 8 | Unix Commands | Yes | No | Yes | No | 1997 |
|
|