On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems

被引:8
|
作者
Allen, WH [1 ]
Marin, GA [1 ]
机构
[1] Univ Cent Florida, Sch Elect Engn & Comp Sci, Orlando, FL 32816 USA
关键词
self-similarity; intrusion detection; network data analysis; traffic generation; DARPA evaluation data;
D O I
10.1109/SAINT.2003.1183056
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The difficulty of quantifying the accuracy of intrusion detection tools against real network data mandates that researchers use simulated attack data for the partial evaluation of such tools. In 1998 and 1999 researchers at MIT Lincoln Labs produced datasets both with and without attack data specifically for use by those interested in developing intrusion detection tools. Because self-similarity has been shown to be a statistical property, of real network traffic, this paper examines the attack-free datasets for the presence of self-similarity in various time periods. The results offer insight for researchers who may wish to use specific subsets of the data for testing. Where the results indicate a lack of self-similarity in the data, the likely cause was determined to be either a low activity level or traffic that was dominated by a single protocol, thus forcing the overall distribution to match its own.
引用
收藏
页码:242 / 248
页数:7
相关论文
共 50 条
  • [1] An Intrusion Alarming System Based on Self-Similarity of Network Traffic
    YU Fei 1
    2. Computer and Communication Institute
    [J]. Wuhan University Journal of Natural Sciences, 2005, (01) : 169 - 173
  • [2] Self-similarity based lightweight intrusion detection method
    Kwon, Hyukmin
    Kim, Eunjin
    Yu, Song Jin
    Kim, Huy Kang
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (11): : 3683 - 3690
  • [3] Application of wavelets and self-similarity to enterprise network intrusion detection and prevention systems
    Akujuobi, C. M.
    Ampah, N. K.
    Sadiku, Matthew N. O.
    [J]. 2007 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2007, : 269 - 274
  • [4] Using Traffic Self-Similarity for Network Anomalies Detection
    Popa, Sorin Mihai
    Manea, George Marian
    [J]. 2015 20TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE, 2015, : 639 - 644
  • [5] Self-similarity in highway traffic
    E.G. Campari
    G. Levi
    [J]. The European Physical Journal B - Condensed Matter and Complex Systems, 2002, 25 : 245 - 251
  • [6] Self-similarity in highway traffic
    Campari, EG
    Levi, G
    [J]. EUROPEAN PHYSICAL JOURNAL B, 2002, 25 (02): : 245 - 251
  • [7] Self-similarity of network traffic
    [J]. 2000, Journal of Nanjing Institute of Posts and Telecommunications, China (20):
  • [8] Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems
    Nash, DA
    Ragsdale, DJ
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2001, 31 (04): : 327 - 331
  • [9] Online error detection through observation of traffic self-similarity
    Schleifer, W
    Männle, M
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2001, 148 (01): : 38 - 42
  • [10] Self-similarity Based Lightweight Intrusion Detection Method for Cloud Computing
    Kwon, Hyukmin
    Kim, Taesu
    Yu, Song Jin
    Kim, Huy Kang
    [J]. INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2011, PT II, 2011, 6592 : 353 - 362