An analysis of the 1999 DARPA/lincoln Laboratory evaluation data for network anomaly detection

作者: Matthew V. Mahoney , Philip K. Chan

DOI: 10.1007/978-3-540-45248-5_13

关键词:

摘要: The DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set is the most widely used public benchmark for testing systems. Our investigation of 1999 background network traffic suggests presence simulation artifacts that would lead to overoptimistic anomaly effect can be mitigated without knowledge specific by mixing real into simulation, although method requires both system and analyzed possibly modified ensure does not model simulated independently traffic.

参考文章(36)
Aaron Schwartzbard, Anup K. Ghosh, A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT. recent advances in intrusion detection. ,(1999)
Aaron Schwartzbard, Anup K. Ghosh, A study in using neural networks for anomaly and misuse detection usenix security symposium. pp. 12- 12 ,(1999)
Sushil Jajodia, Daniel Barbará, Ningning Wu, DETECTING NOVEL NETWORK INTRUSIONS USING BAYES ESTIMATORS siam international conference on data mining. pp. 0- 0 ,(2001)
Lada Adamic, Bernardo A. Huberman, The Nature of Markets in the World Wide Web Social Science Research Network. ,(1999) , 10.2139/SSRN.166108
Giovanni Vigna, Richard A. Kemmerer, NetSTAT: a network-based intrusion detection system Journal of Computer Security. ,vol. 7, pp. 37- 71 ,(1999) , 10.3233/JCS-1999-7103
Peter G. Neumann, Phillip A. Porras, Experience with EMERALD to Date ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1. pp. 73- 80 ,(1999)
L. A. Adamic, Zipf, Power-laws, and Pareto-a ranking tutorial Xerox Palo Alto Research Center. ,(2000)
Yihua Liao, V. Rao Vemuri, Using Text Categorization Techniques for Intrusion Detection usenix security symposium. pp. 51- 59 ,(2002)