{"title":"MAGNA:建模和生成网络攻击","authors":"W. Allen, G. Marin","doi":"10.1109/LCN.2004.75","DOIUrl":null,"url":null,"abstract":"We present a system that generates synthetic attack traffic from state-based models of the behavior of real network attacks. The execution of these attacks can be carefully controlled to produce realistic training data that could prove useful in the evaluation and development of intrusion detection systems This tool can also be used to test host systems and networks for known vulnerabilities by launching controlled attacks and observing their impact on the target.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"MAGNA: modeling and generating network attacks\",\"authors\":\"W. Allen, G. Marin\",\"doi\":\"10.1109/LCN.2004.75\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present a system that generates synthetic attack traffic from state-based models of the behavior of real network attacks. The execution of these attacks can be carefully controlled to produce realistic training data that could prove useful in the evaluation and development of intrusion detection systems This tool can also be used to test host systems and networks for known vulnerabilities by launching controlled attacks and observing their impact on the target.\",\"PeriodicalId\":366183,\"journal\":{\"name\":\"29th Annual IEEE International Conference on Local Computer Networks\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-11-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"29th Annual IEEE International Conference on Local Computer Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LCN.2004.75\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"29th Annual IEEE International Conference on Local Computer Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LCN.2004.75","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We present a system that generates synthetic attack traffic from state-based models of the behavior of real network attacks. The execution of these attacks can be carefully controlled to produce realistic training data that could prove useful in the evaluation and development of intrusion detection systems This tool can also be used to test host systems and networks for known vulnerabilities by launching controlled attacks and observing their impact on the target.