Proposals on assessment environments for anomaly-based network intrusion detection systems

被引:0
|
作者
Bermudez-Edo, M. [1 ]
Salazar-Hernandez, R. [1 ]
Diaz-Verdejo, J. [1 ]
Garcia-Teodoro, P. [1 ]
机构
[1] Univ Granada, Dpt Signal Theory Telemat & Commun, ETS Ing Informat & Telecomun, C Periodista Daniel Saucedo Aranda SN, E-18071 Granada, Spain
关键词
network security; intrusion event; IDS; assessment;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the key challenges that researchers should face when proposing a new intrusion detection approach (IDS) is that of demonstrating its general validity. This fact goes necessarily through the disposal of a real set of intrusion (as well as non-intrusion) related events, from which to compare and thus validate the performance of the novel proposed techniques. However, this a priori simple issue is far to be obvious because of the lack of a commonly accepted assessment methodology. In this line, the authors discuss a set of basic requirements that an intrusion-oriented framework should fulfill in order to deal with the normalization of the evaluation process in IDS environments. In its current preliminary state, the work is mainly focused to analyze, specify and manage traffic databases for developing and validating NIDS.
引用
收藏
页码:210 / +
页数:3
相关论文
共 50 条
  • [1] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    [J]. COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [2] ANOMALY-BASED NETWORK INTRUSION DETECTION METHODS
    Nevlud, Pavel
    Bures, Miroslav
    Kapicak, Lukas
    Zdralek, Jaroslav
    [J]. ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2013, 11 (06) : 468 - 474
  • [3] Anomaly-Based Network Intrusion Detection System
    Villalba, L. J. G.
    Orozco, A. L. S.
    Vidal, J. M.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (03) : 850 - 855
  • [4] LSTM for Anomaly-Based Network Intrusion Detection
    Althubiti, Sara A.
    Jones, Eric Marcell, Jr.
    Roy, Kaushik
    [J]. 2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 293 - 295
  • [5] Generation & evaluation of datasets for anomaly-based intrusion detection systems in IoT environments
    Choudhary, Vandana
    Tanwar, Sarvesh
    [J]. Multimedia Tools and Applications, 2024,
  • [6] Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments
    Ghafouri, Amin
    Abbas, Waseem
    Laszka, Aron
    Vorobeychik, Yevgeniy
    Koutsoukos, Xenofon
    [J]. DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 415 - 434
  • [7] Anomaly-Based Network Intrusion Detection Using SVM
    Zhang, Yuan
    Yang, Qinghai
    Lambotharan, Sangarapillai
    Kyriakopoulos, Konstantinos
    Ghafir, Ibrahim
    AsSadhan, Basil
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [8] Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques
    Kumar, Neeraj
    Kumar, Upendra
    [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 262 - 269
  • [9] Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems
    Bolzoni, Damiano
    Etalle, Sandro
    Hartel, Pieter H.
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 1 - 20
  • [10] Building Multiclass Classification Baselines for Anomaly-based Network Intrusion Detection Systems
    Shah, Ajay
    Clachar, Sophine
    Minimair, Manfred
    Cook, Davis
    [J]. 2020 IEEE 7TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS (DSAA 2020), 2020, : 759 - 760