A Network Data Abstraction Method for Data Set Verification

被引:0
|
作者
Cho, Jaeik [1 ]
Choi, Kyuwon [2 ]
Shon, Taeshik [3 ]
Moon, Jongsub [1 ]
机构
[1] Korea Univ, Grad Sch Informat Secur, Seoul, South Korea
[2] IIT, ECE, Chicago, IL USA
[3] Ajou Univ, Coll Informat Technol, Suwon 441749, South Korea
关键词
Data set modeling; Intrusion detection system;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network data sets are often used for evaluating the performance of intrusion detection systems and intrusion prevention systems[1]. The KDD CUP 99' data set, which was modeled after MIT Lincoln laboratory network data has been a popular network data set used for evaluation network intrusion detection algorithm and system. However, many points at issues have been discovered concerning the modeling method of the KDD CUP 99' data. This paper proposed both a measure to compare the similarities between two data groups and an optimization method to efficiently modeled data sets with the proposed measure. Then, both similarities between KDD CUP 99' and MIT Lincoln laboratory data that between our composed data set from the MIT Lincoln laboratory data and MIT Lincoln laboratory are compared quantitatively.
引用
收藏
页码:54 / +
页数:3
相关论文
共 50 条
  • [1] Verification of Statecharts Using Data Abstraction
    Helke, Steffen
    Kammueller, Florian
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 571 - 583
  • [2] Data Abstraction: A General Framework to Handle Program Verification of Data Structures
    Braine, Julien
    Gonnord, Laure
    Monniaux, David
    [J]. STATIC ANALYSIS, SAS 2021, 2021, 12913 : 215 - 235
  • [3] Combining Control and Data Abstraction in the Verification of Hybrid Systems
    Briand, Xavier
    Jeannet, Bertrand
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2010, 29 (10) : 1481 - 1494
  • [4] Control and data abstraction: The cornerstones of practical formal verification
    Kesten Y.
    Pnueli A.
    [J]. International Journal on Software Tools for Technology Transfer, 2000, 2 (04) : 328 - 342
  • [5] Verification of Deployed Artifact Systems via Data Abstraction
    Belardinelli, Francesco
    Lomuscio, Alessio
    Patrizi, Fabio
    [J]. SERVICE-ORIENTED COMPUTING, 2011, 7084 : 142 - 156
  • [6] THE NURSING MINIMUM DATA SET - ABSTRACTION TOOL FOR STANDARDIZED, COMPARABLE, ESSENTIAL DATA
    WERLEY, HH
    DEVINE, EC
    ZORN, CR
    RYAN, P
    WESTRA, BL
    [J]. AMERICAN JOURNAL OF PUBLIC HEALTH, 1991, 81 (04) : 421 - 426
  • [7] Automatic data path abstraction for verification of large scale designs
    Paruthi, V
    Mansouri, N
    Vemuri, R
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER DESIGN: VLSI IN COMPUTERS AND PROCESSORS, PROCEEDINGS, 1998, : 192 - 194
  • [8] PIR-based data integrity verification method in sensor network
    Yong-Ki Kim
    Kwangnam Choi
    Jaesoo Kim
    JungHo Seok
    [J]. Journal of Central South University, 2014, 21 : 3883 - 3888
  • [9] PIR-based data integrity verification method in sensor network
    Kim, Yong-Ki
    Choi, Kwangnam
    Kim, Jaesoo
    Seok, JungHo
    [J]. JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2014, 21 (10) : 3883 - 3888
  • [10] PIR-based data integrity verification method in sensor network
    Yong-Ki Kim
    Kwangnam Choi
    Jaesoo Kim
    JungHo Seok
    [J]. Journal of Central South University, 2014, 21 (10) : 3883 - 3888