欢迎来到天天文库
浏览记录
ID:44707780
大小:504.01 KB
页数:6页
时间:2019-10-25
《入侵检测数据集2》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、2013IEEEWirelessCommunicationsandNetworkingConference(WCNC):SERVICES&APPLICATIONS1GenerationofanewIDSTestDataset:TimetoRetiretheKDDCollectionGideonCreech,StudentMember,IEEE,andJiankunHuy,Member,IEEEAbstract—Intrusiondetectionsystemsaregenerallytestedtheouterperimeterisbypassedthenonlyintern
2、alsecurityusingdatasetscompiledattheendoflastcentury,justifiedmeasuresstandbetweenanattackerandcriticaldata.bytheneedforpubliclyavailabletestdataandthelackofHost-basedIntrusionDetectionSystems(HIDS)representanyotheralternativedatasets.Prominentamongstthislegacyoneofthemosteffectivemeansofdef
3、eatinganattackergroupistheKDDproject.Whilstaseminalcontributionatthetimeofcompilation,thesedatasetsnolongerrepresentrelevantwhohasbypassedtheouterperimeterofthenetwork[5].architectureorcontemporaryattackprotocols,andarebesetbyHIDSareasubsetofIntrusionDetectionSystems(IDS),anddatacorruptions
4、andinconsistencies.Hence,testingofnewIDSmonitortheactivityonasinglehost.Bycontrast,NetworkIDSapproachesagainstthesedatasetsdoesnotprovideaneffectivemonitorcommunicationsbetweenhosts,andattempttodetectperformancemetric,andcontributestoerroneousefficacyclaims.maliciousactivitypresentinthatnetw
5、orktraffic.SignificantThispaperintroducesanewpubliclyavailabledatasetwhichisrepresentativeofmodernattackstructureandmethodology.researchefforthasbeenexpendedoverthepastdecadesinThenewdatasetiscontrastedwiththelegacydatasets,andtheimprovingHIDSperformance[6].Thisresearchhascentredperformancedi
6、fferenceofcommonlyusedintrusiondetectionontwomainmethodologies.algorithmsishighlighted.Thefirstmethodologyissignature-baseddetection.Usingthisapproach,templatesofknownattackpatternsaredis-tributedbyacentralauthority,andtheIDSthenmatchesI.INTRODUCTIONobservedbehaviouragainstthesetemplates.Thi
7、sapproachisComputersecurityisafundamentalpartofmodernlife.similartoantivirusmethods,andprovidesareasonablelevelRegardlessofwhetheracomputerisastand-alonesystemofaccuracyagainstknownattacks.Thecriticalweaknessofoperatedbyaprivateuserorasinglenodeinalargec
此文档下载收益归作者所有