Testing IDS using GENESIDS: Realistic Mixed Traffic Generation for IDS Evaluation

Felix Erlacher, F. Dressler
{"title":"Testing IDS using GENESIDS: Realistic Mixed Traffic Generation for IDS Evaluation","authors":"Felix Erlacher, F. Dressler","doi":"10.1145/3234200.3234204","DOIUrl":null,"url":null,"abstract":"Evaluating signature-based Network Intrusion Detection Systems (NIDS) is a necessary but in general difficult task. Often, live or recorded real-world traffic is used. However, real-world network traffic is often hard to come by at larger scale and the few available traces usually do not contain application layer payload. Furthermore, these traces only contain a small amount of malicious traffic, which does not suffice to thoroughly test a NIDS. We solve this problem by proposing a complete stateful traffic generation system that mixes realistic traffic with user definable malicious HTTP traffic with the purpose of evaluating a NIDS. By relying on the Snort syntax for traffic definition, we guarantee a large dataset of realistic up-to-date attack patterns.","PeriodicalId":124017,"journal":{"name":"Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3234200.3234204","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Evaluating signature-based Network Intrusion Detection Systems (NIDS) is a necessary but in general difficult task. Often, live or recorded real-world traffic is used. However, real-world network traffic is often hard to come by at larger scale and the few available traces usually do not contain application layer payload. Furthermore, these traces only contain a small amount of malicious traffic, which does not suffice to thoroughly test a NIDS. We solve this problem by proposing a complete stateful traffic generation system that mixes realistic traffic with user definable malicious HTTP traffic with the purpose of evaluating a NIDS. By relying on the Snort syntax for traffic definition, we guarantee a large dataset of realistic up-to-date attack patterns.
使用GENESIDS测试IDS:用于IDS评估的真实混合流量生成
对基于签名的网络入侵检测系统(NIDS)进行评估是一项必要而又困难的工作。通常,使用实时或记录的真实世界流量。然而,现实世界的网络流量通常很难在更大的规模上得到,而且少数可用的跟踪通常不包含应用层有效负载。此外,这些痕迹只包含少量恶意流量,不足以彻底测试NIDS。我们通过提出一个完整的有状态流量生成系统来解决这个问题,该系统将真实流量与用户可定义的恶意HTTP流量混合在一起,目的是评估NIDS。通过依赖Snort语法进行流量定义,我们保证了一个包含最新攻击模式的大型数据集。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信