Manipulation of Network Traffic Traces for Security Evaluation

被引:7
|
作者
Gadelrab, Mohammed [1 ]
El Kalam, Anas Abou [2 ]
Deswarte, Yves [1 ]
机构
[1] Univ Toulouse, LAAS CNRS, 7 Ave Colonel Roche, F-31077 Toulouse, France
[2] Univ Toulouse, IRIT, ENSEEIHT, F-31077 Toulouse, France
关键词
Security testing; IDS evaluation; network traffic generation;
D O I
10.1109/WAINA.2009.36
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Testing network-based security tools such as Intrusion Detection and Prevention Systems (IDS/IPS) differs from testing ordinary network tools (e.g., routers and switches). Basically, in addition to the parameters (such as bandwidth utilization, routing information and packets timing) that are important for network tools, security tools are more sensitive to issues like traffic composition, contents, and session-level parameters. Generating a realistic synthetic traffic that keeps all the characteristics of the real traffic has proved to be difficult. For this reason, security testers often use real traffic traces in their test or evaluation. However, the available traces are often limited in number or size. Therefore, it is necessary to merge and manipulate traces to create a test environment that would be representative of the operational environment, and to inject attacks into the traffic. A variety of tools for recording, replaying as well as forging packets can be obtained easily, but there exist very few tools for manipulating traces so as to modify the traffic composition from the networking viewpoint. Among them, surprisingly there is no tool for manipulating traces without destructing their security-relevant characteristics. In this paper, we present a brief survey for trace manipulation and packet forging tools. Then we determine the requirements of tools for manipulating traces and injecting attacks while keeping their original characteristics. Finally, we present the architecture, and the implementation of our tool intended to fill this lack in security testing tools.
引用
收藏
页码:1124 / +
页数:2
相关论文
共 50 条
  • [1] Security Evaluation of Hosts Based on Network Traffic
    Gao, Cuixia
    Li, Zhitang
    Chen, Lin
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 901 - 905
  • [2] Investigating Application Behavior in Network Traffic Traces
    Foroushani, Vahid Aghaei
    Zincir-Heywood, A. Nur
    [J]. 2013 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE FOR SECURITY AND DEFENSE APPLICATIONS (CISDA), 2013, : 72 - 79
  • [3] Toward Highly Reliable Network Traffic Traces
    Awad, Ali Ismail
    Ali, Hanafy Mahmud
    Hamed, Heshasm F. A.
    [J]. 2013 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS SIGNAL PROCESSING, AND THEIR APPLICATIONS (ICCSPA'13), 2013,
  • [4] Generation of high bandwidth network traffic traces
    Kamath, P
    Lan, KC
    Heidemann, J
    Bannister, J
    Touch, J
    [J]. MASCOTS 2002: 10TH IEEE INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF COMPUTER AND TELECOMMUNICATIONS SYSTEMS, PROCEEDINGS, 2002, : 401 - 410
  • [5] Performance evalution of open-source software for traffic traces manipulation and analysis
    Retamosa, German
    Aracil, Javier
    [J]. INFOCOMMUNICATIONS JOURNAL, 2012, 4 (03): : 1 - 8
  • [6] Traffic Management and Security in Wired Network
    Dhaka, Shivali
    [J]. INFORMATION, COMMUNICATION AND COMPUTING TECHNOLOGY, ICICCT 2018, 2019, 835 : 17 - 30
  • [7] Network Traffic Classification for Security Analysis
    Boger, Mark
    Liu, Tianyuan
    Ratliff, Jacqueline
    Nick, William
    Yuan, Xiaohong
    Esterline, Albert
    [J]. SOUTHEASTCON 2016, 2016,
  • [8] Security by Simple Network Traffic Monitoring
    Tsunoda, Hiroshi
    Keeni, Glenn Mansfield
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 201 - 204
  • [9] A Unified Approach to Network Traffic and Network Security Visualisation
    Read, Huw
    Blyth, Andrew
    Sutherland, Iain
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 614 - 619
  • [10] Network Security: Approach Based on Network Traffic Prediction
    Thakare, Sheetal
    Pund, Anshuman
    Pund, M. A.
    [J]. PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 41 - 55