Title

Modeling Networking Protocols To Test Intrusion Detection Systems

Abstract

Techniques for detecting previously unseen network intrusion attempts often depend on finding anomalous behavior in network traffic streams. Thus, Intrusion Detection Systems generally require tuning to be effective in each new environment. It follows that researchers need to produce traffic backgrounds for laboratory testing that accurately reflect the characteristics of organizations of interest. To these they need to be able to add attacks under controlled conditions so that actual performance of new IDS techniques can be evaluated. The authors have been working towards such a realistic and flexible testing environment. In previous work we have used application protocol traffic generation techniques and confirmed some of the classical statistical distributions. The distributions of other protocols have been updated based on the analysis of current traffic. In this paper hybrid and heavy-tailed modeling techniques are used to build a detailed model of FTP including session arrivals, bytes transferred, and idle times. The same techniques are being used for other protocols including HTTP. © 2004 IEEE.

Publication Date

12-1-2004

Publication Title

Proceedings - Conference on Local Computer Networks, LCN

Number of Pages

774-775

Document Type

Article; Proceedings Paper

Personal Identifier

scopus

Socpus ID

20544457472 (Scopus)

Source API URL

https://api.elsevier.com/content/abstract/scopus_id/20544457472

This document is currently not available here.

Share

COinS