【24h】

Redesign and Implementation of Evaluation Dataset for Intrusion Detection System

机译:入侵检测系统评估数据集的重新设计与实现

获取原文
获取原文并翻译 | 示例

摘要

Although the intrusion detection system industry is rapidly maturing, the state of intrusion detection system evaluation is not. The off-line dataset evaluation proposed by MIT Lincoln Lab is a practical solution in terms of evaluating the performance of IDS. While the evaluation dataset represents a significant and monumental undertaking, there remain several issues unsolved in the design and modeling of the resulting dataset which may make the evaluation results biased. Some researchers have noticed such problems and criticized the design and execution of the dataset, but there is no technical contribution for new efforts proposed per se. In this paper we present our efforts to redesign and generate new dataset. We first study how network applications and user behaviors characterize the network traffic. Second, we apply ourselves to improve on the background traffic simulation (including HTTP, SMTP, POP, P2P, FTP and other types of traffic). Unlike the existing model, our model simulates traffic from user level rather than from packet level, which is more reasonable for background traffic modeling and simulation. Our model takes advantage of user-level web mining, automatic user profiling and Enron email dataset etc. The high fidelity of simulated background traffic is shown in experiment. Moreover, different kinds of attacker personalities are profiled and more than 300 instances of 62 different automated attacks are launched against victim hosts and servers. All our efforts try to make the dataset more "real" and therefore be fairer for IDS evaluation.
机译:尽管入侵检测系统行业正在迅速成熟,但入侵检测系统评估的状态尚未成熟。麻省理工学院林肯实验室提出的离线数据集评估在评估IDS性能方面是一种实用的解决方案。虽然评估数据集是一项重大而艰巨的任务,但在结果数据集的设计和建模中仍存在一些未解决的问题,这可能会使评估结果产生偏差。一些研究人员已经注意到了此类问题,并批评了数据集的设计和执行,但是对于所提议的新工作本身没有任何技术贡献。在本文中,我们介绍了重新设计和生成新数据集的工作。我们首先研究网络应用程序和用户行为如何表征网络流量。其次,我们致力于改善后台流量模拟(包括HTTP,SMTP,POP,P2P,FTP和其他类型的流量)。与现有模型不同,我们的模型从用户级别而不是从数据包级别模拟流量,这对于后台流量建模和仿真更为合理。我们的模型利用了用户级别的Web挖掘,自动用户配置文件和Enron电子邮件数据集等优势。实验显示了模拟背景流量的高保真度。此外,对不同类型的攻击者人物进行了概要分析,并针对受害主机和服务器发起了300多次实例,分别进行了62种不同的自动攻击。我们所有的努力都试图使数据集更加“真实”,因此对于IDS评估更加公平。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号