Next Article in Journal
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
Next Article in Special Issue
The Evolution of Volatile Memory Forensics
Previous Article in Journal
Work Experience as a Factor in Cyber-Security Risk Awareness: A Survey Study with University Students
Previous Article in Special Issue
Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising
 
 
Article
Peer-Review Record

Requirements for Crafting Virtual Network Packet Captures

J. Cybersecur. Priv. 2022, 2(3), 516-526; https://doi.org/10.3390/jcp2030026
by Daniel Spiekermann 1 and Jörg Keller 2,*
Reviewer 1:
J. Cybersecur. Priv. 2022, 2(3), 516-526; https://doi.org/10.3390/jcp2030026
Submission received: 9 May 2022 / Revised: 28 June 2022 / Accepted: 4 July 2022 / Published: 6 July 2022
(This article belongs to the Special Issue Cyber Security and Digital Forensics)

Round 1

Reviewer 1 Report

This paper investigate the requirements to be met by packet generators for virtualised networks. The process of creating such a dataset is a time-consuming and error-prone task, it is faced with different issues. The process is not fully applicable to the intended purpose, subsequent errors might be undetected.

It is a good work. I think this work can be accepted.

Author Response

Dear Editor, Dear Review,

please find our reply letter below.

Yours Sincerely, J. Keller

 

Author Response File: Author Response.pdf

Reviewer 2 Report

The article is focused on generating virtual network packets.
One of the main benefits presented by authors in the article is the analysis of relevant variables in operation from the virtual network. The authors do not describe the obtained data in depth, I miss a more detailed description of the potential dataset (s). In this area, machine learning methods and deep learning are used to solve various problems, which, however, requires a sufficient amount of data. The authors state this fact, but they do not describe in depth which tasks in terms of knowledge acquisition are most often solved in this domain (prediction, classification, segmentation, ..). It would
be desirable to pay deeper attention to this issue, ie. what methods and to solve what problems, respectively tasks in terms of knowledge acquisition are used. The specific structure and nature of
the data predetermine the use of specific machine learning methods.
At the end of the article, the authors reiterate the requirement to create usable datasets for analysis purposes also through machine learning methods.

 

Author Response

Dear Editor, Dear Review,

please find our reply letter below.

Yours Sincerely, J. Keller

Author Response File: Author Response.pdf

Back to TopTop