메뉴 건너뛰기




Volumn 3, Issue 4, 2000, Pages 262-294

Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory

Author keywords

Computer security; intrusion detection; receiver operating curves (ROC); Security; software evaluation

Indexed keywords


EID: 85019691440     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/382912.382923     Document Type: Article
Times cited : (1057)

References (30)
  • 1
    • 84944255863 scopus 로고    scopus 로고
    • Using rule-based activity descriptions to evaluate intrusion-detection systems
    • H. Debar, L. Me, and S. F. Wu, Eds. Springer-Verlag, New York, NY
    • Alessandri, D. 2000. Using rule-based activity descriptions to evaluate intrusion-detection systems. In RAID2000, H. Debar, L. Me, and S. F. Wu, Eds. Springer-Verlag, New York, NY, 183-196
    • (2000) RAID2000 , pp. 183-196
    • Alessandri, D.1
  • 2
    • 0003914522 scopus 로고    scopus 로고
    • State of the practice of intrusion detection technologies
    • CMU/SEI. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA
    • Allen, J., Christie, A., Fithen, W., Mchugh, J., Pickel, J., and Stoner, E. 2000. State of the practice of intrusion detection technologies. CMU/SEI-99-TR-028,CMU/SEI. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA
    • (2000) CMU/SEI-99-TR-028
    • Allen, J.1    Christie, A.2    Fithen, W.3    Mchugh, J.4    Pickel, J.5    Stoner, E.6
  • 4
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion-detection systems: A taxonomy and survey
    • (March)
    • Axelsson, S. 2000. Intrusion-detection systems: A taxonomy and survey. 99-115 (March)
    • (2000) , pp. 99-115
    • Axelsson, S.1
  • 5
    • 0003524305 scopus 로고    scopus 로고
    • A preliminary attempt to apply detection and estimation theory to intrusion detection
    • 00--4 (March)
    • Axelsson, S. 2000. A preliminary attempt to apply detection and estimation theory to intrusion detection. 00--4 (March)
    • (2000)
    • Axelsson, S.1
  • 6
    • 0009060610 scopus 로고
    • Packets found on an internet
    • (July)
    • Bellovin, S. M. 1993. Packets found on an internet. SIGCOMM Comput. Commun. Rev. 23, 3 (July), 26-31
    • (1993) SIGCOMM Comput. Commun. Rev. , vol.23 , pp. 26-31
    • Bellovin, S.M.1
  • 7
    • 0141462933 scopus 로고    scopus 로고
    • Attack development for intrusion detection
    • Master's Thesis. Massachusetts Institute of Technology, Cambridge, MA
    • Das, K. 2000. Attack development for intrusion detection. Master's Thesis. Massachusetts Institute of Technology, Cambridge, MA
    • (2000)
    • Das, K.1
  • 9
    • 0031632923 scopus 로고    scopus 로고
    • A fast vocabulary independent algorithm for spotting words in speech
    • Speech and Signal Processing (May)
    • Dharanipragada, S. and Roukos, S. 1998. A fast vocabulary independent algorithm for spotting words in speech. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing (May). 233-236
    • (1998) Proceedings of the International Conference on Acoustics , pp. 233-236
    • Dharanipragada, S.1    Roukos, S.2
  • 10
    • 84966620150 scopus 로고    scopus 로고
    • Testing and evaluating computer intrusion detection systems
    • Durst, R., Champion, T., Witten, B., Miller, E., and Spagnuolo, L. 1999. Testing and evaluating computer intrusion detection systems. Commun. ACM 42, 7, 53-61
    • (1999) Commun. ACM , vol.42 , Issue.7 , pp. 53-61
    • Durst, R.1    Champion, T.2    Witten, B.3    Miller, E.4    Spagnuolo, L.5
  • 11
    • 0004080666 scopus 로고
    • Signal Detection Theory and ROC Analysis
    • Academic Press, Inc., Orlando, FL
    • Egan, J. P. 1975. Signal Detection Theory and ROC Analysis. Academic Press, Inc., Orlando, FL
    • (1975)
    • Egan, J.P.1
  • 12
    • 33751501674 scopus 로고
    • The Myth of the Britannica
    • Grove Press, New York, NY
    • Einbinder, H. 1964. The Myth of the Britannica. Grove Press, New York, NY
    • (1964)
    • Einbinder, H.1
  • 13
    • 0003774428 scopus 로고
    • How to Lie with Statistics
    • W. W. Norton & Co., Inc., New York, NY
    • Huff, D. 1954. How to Lie with Statistics. W. W. Norton & Co., Inc., New York, NY
    • (1954)
    • Huff, D.1
  • 14
    • 85012973695 scopus 로고
    • A fast lattice-based approach to vocabulary independent wordspotting
    • Speech, and Signal Processing 2
    • James, D. A. and Young, S. J. 1994. A fast lattice-based approach to vocabulary independent wordspotting. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing 2. 337-380
    • (1994) Proceedings of the IEEE International Conference on Acoustics , pp. 337-380
    • James, D.A.1    Young, S.J.2
  • 16
    • 0031625061 scopus 로고    scopus 로고
    • Keyword verification considering the correlation of succeeding feature vectors
    • Speech and Signal Processing (May)
    • Junkawitsch, J. and HÖge, H. 1998. Keyword verification considering the correlation of succeeding feature vectors. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing (May). 221-224
    • (1998) Proceedings of the International Conference on Acoustics , pp. 221-224
    • Junkawitsch, J.1    HÖge, H.2
  • 17
    • 0004204715 scopus 로고    scopus 로고
    • A database of computer attacks for the evaluation of intrusion detection systems
    • Master's Thesis. Massachusetts Institute of Technology, Cambridge, MA
    • Kendall, K. 1999. A database of computer attacks for the evaluation of intrusion detection systems. Master's Thesis. Massachusetts Institute of Technology, Cambridge, MA
    • (1999)
    • Kendall, K.1
  • 18
    • 0017565919 scopus 로고
    • Review of the ARPA speech understanding project
    • Klatt, D. H. 1977. Review of the ARPA speech understanding project. J. Acoust. Soc. Amer. 62, 1345-1366
    • (1977) J. Acoust. Soc. Amer. , vol.62 , pp. 1345-1366
    • Klatt, D.H.1
  • 19
    • 0141686095 scopus 로고    scopus 로고
    • Windows NT attacks for the evaluation of intrusion detection systems
    • Master's Thesis. Massachusetts Institute of Technology, Cambridge, MA
    • Korba, J. 2000. Windows NT attacks for the evaluation of intrusion detection systems. Master's Thesis. Massachusetts Institute of Technology, Cambridge, MA
    • (2000)
    • Korba, J.1
  • 20
    • 84944222170 scopus 로고    scopus 로고
    • The 1999 DARPA off-line intrusion detection evaluation
    • H. Debar, L. Me, and S. F. WU, EDS. SPRINGER-VERLAG, NEW YORK, NY
    • Lippmann, R., Haines, J. W., Fried, D. J., Korba, J., and Das, K. 2000. The 1999 DARPA off-line intrusion detection evaluation. In RAID2000, H. Debar, L. Me, and S. F. WU, EDS. SPRINGER-VERLAG, NEW YORK, NY, 162-182
    • (2000) RAID2000 , pp. 162-182
    • Lippmann, R.1    Haines, J.W.2    Fried, D.J.3    Korba, J.4    Das, K.5
  • 22
    • 84962260018 scopus 로고    scopus 로고
    • Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
    • In Proceedings of the on DARPA Information Survivability Conference and Exposition (DISCEX '00, Hilton Head, South Carolina, Jan. 25-27). IEEE Computer Society Press, Los Alamitos, CA
    • Lippmann, R. P., Fried, D., Graf, I., Haines, J., Kendall, K., Mcclung, D., Webber, D., Webster, S., Wyschograd, D., Cunninghan, R., and Zissman, M. 2000. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings of the on DARPA Information Survivability Conference and Exposition (DISCEX '00, Hilton Head, South Carolina, Jan. 25-27). IEEE Computer Society Press, Los Alamitos, CA, 12-26
    • (2000) , pp. 12-26
    • Lippmann, R.P.1    Fried, D.2    Graf, I.3    Haines, J.4    Kendall, K.5    Mcclung, D.6    Webber, D.7    Webster, S.8    Wyschograd, D.9    Cunninghan, R.10    Zissman, M.11
  • 24
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Paxson, V. 1999. Bro: A system for detecting network intruders in real-time. Comput. Netw. J. 23-24 (Dec.), 2435-2463
    • (1999) Comput. Netw. J. 23-24 (Dec.) , pp. 2435-2463
    • Paxson, V.1
  • 25
    • 3643079262 scopus 로고    scopus 로고
    • A software platform for testing intrusion detection systems
    • (Sept.)
    • Puketza, N., Chung, M., Olsson, R. A., and Mukherjee, B. 1997. A software platform for testing intrusion detection systems. IEEE Software 14, 5 (Sept.), 43-51
    • (1997) IEEE Software , vol.14 , pp. 43-51
    • Puketza, N.1    Chung, M.2    Olsson, R.A.3    Mukherjee, B.4
  • 27
    • 0023890867 scopus 로고
    • Measuring the accuracy of diagnostic systems
    • Swets, J. A. 1988. Measuring the accuracy of diagnostic systems. Science 24, 48, 1285-1293
    • (1988) Science , vol.24 , Issue.48 , pp. 1285-1293
    • Swets, J.A.1
  • 28
    • 0003772109 scopus 로고
    • Evaluation of Diagnostic Systems
    • Academic Press, Inc., New York, NY
    • Swets, J. A. and Pickett, R. M. 1982. Evaluation of Diagnostic Systems. Academic Press, Inc., New York, NY
    • (1982)
    • Swets, J.A.1    Pickett, R.M.2
  • 29
    • 4544338227 scopus 로고    scopus 로고
    • A taxonomy of computer intrusions
    • Master's Thesis. Massachusetts Institute of Technology, Cambridge, MA
    • Weber, D. 1998. A taxonomy of computer intrusions. Master's Thesis. Massachusetts Institute of Technology, Cambridge, MA
    • (1998)
    • Weber, D.1
  • 30
    • 0021737684 scopus 로고    scopus 로고
    • (Dec.)
    • Whiting-O'Keefe, Q. E., Henke, C., and Simborg, D. W. 1984. Choosing the correct unit of analysis in medical care experiments. Med. Care 22, 12 (Dec.), 1101-1114
    • , vol.22 , pp. 1101-1114


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.