Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort

被引:3
|
作者
Masumi, Kohei [1 ]
Han, Chansu [1 ]
Ban, Tao [1 ]
Takahashi, Takeshi [1 ]
机构
[1] Natl Inst Informat & Commun Technol, Tokyo, Japan
来源
PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21) | 2021年
关键词
Network intrusion detection; data labeling; Tcpreplay; Snort;
D O I
10.1145/3422337.3450326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Research on network intrusion detection (NID) requires a large amount of traffic data with reliable labels indicating which packets are associated with particular network attacks. In this paper, we implement a prototype of an automated system to create labeled packet datasets for NID research. By re-transmitting pre-captured packet data in a controlled network environment pre-installed with a network intrusion detection system, the system automatically assigns labels to attack packets within the packet data. In the feasibility study, we investigate factors that may influence the detection accuracy of the attacking packets and show an example using the prototype to label a packet file. Finally, we show an efficient way to locate the packets associated with issued NID alerts using this prototype.
引用
收藏
页码:329 / 331
页数:3
相关论文
共 50 条
  • [1] Efficient Snort Rule Generation using Evolutionary computing for Network Intrusion Detection
    Muthuregunathan, Raghavan
    Siddharth, S.
    Srivathsan, R.
    Rajesh, S. R.
    2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009), 2009, : 336 - 341
  • [2] Datasets are not enough: Challenges in labeling network traffic
    Guerra, Jorge Luis
    Catania, Carlos
    Veas, Eduardo
    COMPUTERS & SECURITY, 2022, 120
  • [3] Deep neural network models for identifying incident dementia using claims and EHR datasets
    Nori, Vijay S.
    Hane, Christopher A.
    Sun, Yezhou
    Crown, William H.
    Bleicher, Paul A.
    PLOS ONE, 2020, 15 (09):
  • [4] Efficient assessment and evaluation for websites vulnerabilities using SNORT
    Yarmouk University, Jordan
    Int. J. Secur. Appl., 1 (7-16):
  • [5] Efficient Assessment and Evaluation for Websites Vulnerabilities Using SNORT
    Dabbour, Mohammad
    Alsmadi, Izzat
    Alsukhni, Emad
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (01): : 7 - 16
  • [6] Performance Analysis of Snort using Network Function Virtualization
    Qayyum, Maham
    Hamid, Wajeeha
    Shah, Munam Ali
    2018 24TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC' 18), 2018, : 561 - 566
  • [7] Towards efficient and secure analysis of large datasets
    Cimato, Stelvio
    Nicolo, Stefano
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 1351 - 1356
  • [8] Two-Stage Decomposition of SNORT Rules towards Efficient Hardware Implementation
    Chen, Hao
    Summerville, Douglas H.
    Chen, Yu
    2009 7TH INTERNATIONAL WORKSHOP ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS (DRCN 2009), 2009, : 359 - 366
  • [9] A skype Ml datasets validation and detection mechanism using snort rules and statistical approaches
    Ibrahim, Hamza Awad Hamza
    Nor, Sulaiman Mohd
    Abdelaziz, Izzeldin Ibrahim Mohamed
    Information Technology Journal, 2013, 12 (09) : 1746 - 1754
  • [10] Efficient Graph Network Using Total Magic Labeling and Its Applications
    Meenakshi, Annamalai
    Kannan, Adhimoolam
    Cep, Robert
    Elangovan, Muniyandy
    MATHEMATICS, 2023, 11 (19)