TU Darmstadt / ULB / TUbiblio

ID2T: a DIY dataset creation toolkit for Intrusion Detection Systems

Cordero, Carlos Garcia and Vasilomanolakis, Emmanouil and Milanov, Nikolay and Koch, Christian and Hausheer, David and Mühlhäuser, Max (2015):
ID2T: a DIY dataset creation toolkit for Intrusion Detection Systems.
In: IEEE Conference on Communications and Network Security (CNS), IEEE, Florence, Italy, pp. 739 - 740, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346912,
[Conference or Workshop Item]

Abstract

Intrusion Detection Systems (IDSs) are an important defense tool against the sophisticated and ever-growing network attacks. These systems need to be evaluated against high quality datasets for correctly assessing their usefulness and comparing their performance. We present an Intrusion Detection Dataset Toolkit (ID2T) for the creation of labeled datasets containing user defined synthetic attacks. The architecture of the toolkit is provided for examination and the example of an injected attack, in real network traffic, is visualized and analyzed. We further discuss the ability of the toolkit of creating realistic synthetic attacks of high quality and low bias.

Item Type: Conference or Workshop Item
Erschienen: 2015
Creators: Cordero, Carlos Garcia and Vasilomanolakis, Emmanouil and Milanov, Nikolay and Koch, Christian and Hausheer, David and Mühlhäuser, Max
Title: ID2T: a DIY dataset creation toolkit for Intrusion Detection Systems
Language: German
Abstract:

Intrusion Detection Systems (IDSs) are an important defense tool against the sophisticated and ever-growing network attacks. These systems need to be evaluated against high quality datasets for correctly assessing their usefulness and comparing their performance. We present an Intrusion Detection Dataset Toolkit (ID2T) for the creation of labeled datasets containing user defined synthetic attacks. The architecture of the toolkit is provided for examination and the example of an injected attack, in real network traffic, is visualized and analyzed. We further discuss the ability of the toolkit of creating realistic synthetic attacks of high quality and low bias.

Title of Book: IEEE Conference on Communications and Network Security (CNS)
Publisher: IEEE
ISBN: 978-1-4673-7876-5
Uncontrolled Keywords: - SSI - Area Secure Smart Infrastructures;Secure Services
Divisions: 20 Department of Computer Science
20 Department of Computer Science > Telecooperation
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
Event Location: Florence, Italy
Date Deposited: 31 Dec 2016 12:59
DOI: 10.1109/CNS.2015.7346912
Identification Number: TUD-CS-2015-1184
Related URLs:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)

View Item View Item