IntruDetector: a software platform for testing network intrusion detection algorithms

作者: Tao Wan , Xue Dong Yang

DOI: 10.1109/ACSAC.2001.991516

关键词:

摘要: An intrusion detection system (IDS), that monitors passively specific computing resources, and reports anomalous or intrusive activities, is becoming an important component in the security of information infrastructure. Algorithms for detecting intrusions are under rapid development, but far from being mature. One interesting difficult issue how to study test a new algorithm against variety (perhaps simulated) activities realistic background traffic. A flexible general-purpose platform testing algorithms clearly desirable. This paper presents such software platform, called IntruDetector. With this can be tested directly real environment with wide range activities. The data normal collected live environment, mixed simulated by hybrid simulation. main properties approach are: (1) traffic realistic; (2) it allows simulation various types intrusions; (3) operation will not disrupted virtually destructive during testing.

参考文章(20)
Debra Anderson, Thane Frivold, Alfonso Valdes, Next-generation Intrusion Detection Expert System (NIDES)A Summary ,(1997)
Aaron Schwartzbard, Anup K. Ghosh, A study in using neural networks for anomaly and misuse detection usenix security symposium. pp. 12- 12 ,(1999)
C.A. Stallings, K.A. Jackson, D.H. Dubois, An expert system application for network intrusion detection ,(1991)
John Heidemann, Nirupama Bulusu, Ramesh Govindan, Jeremy Elson, Deborah Estrin, Kun-chan Lan, Ya Xu, Wei Ye, Chalermek Intanagonwiwat, Effects of Detail in Wireless Network Simulation ,(2001)
Tom Karygiannis, Peter Mell, Wayne Jansen, Don Marks, Applying Mobile Agents to Intrusion Detection and Response ,(1999)
Purdue University. Department of Computer Sciences, Defending a Computer System Using Autonomous Agents ,(1995)
R.P. Lippmann, D.J. Fried, I. Graf, J.W. Haines, K.R. Kendall, D. McClung, D. Weber, S.E. Webster, D. Wyschogrod, R.K. Cunningham, M.A. Zissman, Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation darpa information survivability conference and exposition. ,vol. 2, pp. 12- 26 ,(2000) , 10.1109/DISCEX.2000.821506
Teresa F. Lunt, A survey of intrusion detection techniques Computers & Security. ,vol. 12, pp. 405- 418 ,(1993) , 10.1016/0167-4048(93)90029-5
Eugene H. Spafford, The internet worm program: an analysis ACM SIGCOMM Computer Communication Review. ,vol. 19, pp. 17- 57 ,(1989) , 10.1145/66093.66095