메뉴 건너뛰기




Volumn 31, Issue 3, 2012, Pages 357-374

Toward developing a systematic approach to generate benchmark datasets for intrusion detection

Author keywords

Dataset generation; Intrusion detection; Network traffic profile

Indexed keywords

BENCHMARK DATASETS; CURRENT TRENDS; DATA SETS; DISTRIBUTION MODELS; MALICIOUS ACTIVITIES; MULTI-STAGE ATTACK; NETWORK BEHAVIORS; NETWORK INTRUSION DETECTION; NETWORK TRAFFIC PROFILE; PRIVACY ISSUE; REAL TRACE; REAL TRAFFIC; STATISTICAL CHARACTERISTICS; TRAFFIC COMPOSITIONS;

EID: 84859430323     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2011.12.012     Document Type: Article
Times cited : (1097)

References (37)
  • 2
    • 18744406314 scopus 로고    scopus 로고
    • The origin of bursts and heavy tails in human dynamics
    • A.L. Barabsi The origin of bursts and heavy tails in human dynamics Nature 435 2005 207 211
    • (2005) Nature , vol.435 , pp. 207-211
    • Barabsi, A.L.1
  • 8
    • 33847112108 scopus 로고    scopus 로고
    • Scale-free topology of e-mail networks
    • H. Ebel, L.I. Mielsch, and S. Bornholdt Scale-free topology of e-mail networks Phys Rev E 66 2002 35 103
    • (2002) Phys Rev e , vol.66 , pp. 35-103
    • Ebel, H.1    Mielsch, L.I.2    Bornholdt, S.3
  • 9
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An attack language for state-based intrusion detection
    • S.T. Eckmann, G. Vigna, and R.A. Kemmerer STATL: an attack language for state-based intrusion detection J Comput Secur 10 2002 71 103 (Pubitemid 34531413)
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 71-103
    • Eckmann, S.T.1    Vigna, G.2    Kemmerer, R.A.3
  • 14
    • 1542597362 scopus 로고    scopus 로고
    • Rapid model parameterization from traffic measurements
    • K.C. Lan, and J.S. Heidemann Rapid model parameterization from traffic measurements ACM T Model Comput S 12 2002 201 229
    • (2002) ACM T Model Comput S , vol.12 , pp. 201-229
    • Lan, K.C.1    Heidemann, J.S.2
  • 15
    • 84859426794 scopus 로고    scopus 로고
    • Lawrence Berkeley National Laboratory and ICSI
    • Lawrence Berkeley National Laboratory and ICSI. LBNL/ICSI enterprise tracing project. www.icir.org/enterprise-tracing/.
    • LBNL/ICSI Enterprise Tracing Project
  • 16
    • 1542313508 scopus 로고    scopus 로고
    • Berkeley National Laboratory L.
    • Lawrence Berkeley National Laboratory The internet traffic archive 2010 http://ita.ee.lbl.gov/index.html
    • (2010) The Internet Traffic Archive
  • 17
    • 0003993827 scopus 로고    scopus 로고
    • Lincoln Laboratory M.I.T.
    • M.I.T. Lincoln Laboratory DARPA intrusion detection evaluation 2011 http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/index.html
    • (2011) DARPA Intrusion Detection Evaluation
  • 19
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory
    • J. Mchugh Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory ACM Trans Inf Syst Secur 3 2000 262 294
    • (2000) ACM Trans Inf Syst Secur , vol.3 , pp. 262-294
    • McHugh, J.1
  • 23
    • 84903593793 scopus 로고    scopus 로고
    • An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems
    • D. Mutz, G. Vigna, and R.A. Kemmerer An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems Annual computer security applications conference 2003 374 383
    • (2003) Annual Computer Security Applications Conference , pp. 374-383
    • Mutz, D.1    Vigna, G.2    Kemmerer, R.A.3
  • 25
    • 0028491368 scopus 로고
    • Empirically derived analytic models of wide-area TCP connections
    • V. Paxson Empirically derived analytic models of wide-area TCP connections IEEE/ACM Trans Netw 2 1994 316 336
    • (1994) IEEE/ACM Trans Netw , vol.2 , pp. 316-336
    • Paxson, V.1
  • 29
    • 77955209381 scopus 로고    scopus 로고
    • Outside the closed world: On using machine learning for network intrusion detection
    • R. Sommer, and V. Paxson Outside the closed world: on using machine learning for network intrusion detection Security and privacy, IEEE Symposium on 2010 305 316
    • (2010) Security and Privacy, IEEE Symposium on , pp. 305-316
    • Sommer, R.1    Paxson, V.2
  • 32
    • 77955847605 scopus 로고    scopus 로고
    • Toward credible evaluation of anomaly-based intrusion detection methods
    • M. Tavallaee, N. Stakhanova, and A.A. Ghorbani Toward credible evaluation of anomaly-based intrusion detection methods Trans Sys Man Cyber Part C 40 2010 516 524
    • (2010) Trans Sys Man Cyber Part C , vol.40 , pp. 516-524
    • Tavallaee, M.1    Stakhanova, N.2    Ghorbani, A.A.3
  • 33
    • 84859420819 scopus 로고    scopus 로고
    • The Shmoo Group
    • The Shmoo Group Defcon 2011 http://cctf.shmoo.com/
    • (2011) Defcon
  • 34
    • 0141723181 scopus 로고    scopus 로고
    • University Of California
    • University of California KDD Cup 1999 data 2011 http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html
    • (2011) KDD Cup 1999 Data


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.