Annotating network trace data for anomaly detection research

作者: Andreas Lof , Richard Nelson

DOI: 10.1109/LCNW.2014.6927720

关键词:

摘要: … To evaluate and compare such techniques requires up to date datasets, useful truth data and the ability to record the outputs of the techniques in a common format. Existing datasets for …

参考文章(13)
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
Anna Sperotto, Ramin Sadre, Frank van Vliet, Aiko Pras, A Labeled Data Set for Flow-Based Intrusion Detection ip operations and management. pp. 39- 50 ,(2009) , 10.1007/978-3-642-04968-2_4
Rion Snow, Brendan O'Connor, Daniel Jurafsky, Andrew Y. Ng, Cheap and fast---but is it good? Proceedings of the Conference on Empirical Methods in Natural Language Processing - EMNLP '08. pp. 254- 263 ,(2008) , 10.3115/1613715.1613751
Shane Alcock, Perry Lorier, Richard Nelson, Libtrace: a packet capture and analysis library acm special interest group on data communication. ,vol. 42, pp. 42- 48 ,(2012) , 10.1145/2185376.2185382
John McHugh, Testing Intrusion detection systems ACM Transactions on Information and System Security. ,vol. 3, pp. 262- 294 ,(2000) , 10.1145/382912.382923
Wei Lu, Ali A. Ghorbani, Network anomaly detection based on wavelet analysis EURASIP Journal on Advances in Signal Processing. ,vol. 2009, pp. 837601- ,(2009) , 10.1155/2009/837601
Richard Lippmann, Joshua W Haines, David J Fried, Jonathan Korba, Kumar Das, The 1999 DARPA off-line intrusion detection evaluation recent advances in intrusion detection. ,vol. 34, pp. 579- 595 ,(2000) , 10.1016/S1389-1286(00)00139-0
Jinliang Fan, Jun Xu, Mostafa H. Ammar, Sue B. Moon, Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme international conference on network protocols. ,vol. 46, pp. 253- 272 ,(2002) , 10.1016/J.COMNET.2004.03.033
Varun Chandola, Arindam Banerjee, Vipin Kumar, Anomaly detection: A survey ACM Computing Surveys. ,vol. 41, pp. 15- ,(2009) , 10.1145/1541880.1541882
M.V. Mahoney, P.K. Chan, Learning rules for anomaly detection of hostile network traffic international conference on data mining. pp. 601- 604 ,(2003) , 10.1109/ICDM.2003.1250987