TU Darmstadt / ULB / TUbiblio

ID2T: A DIY Dataset Creation Toolkit for Intrusion Detection Systems

Garcia Cordero, Carlos and Vasilomanolakis, Emmanouil and Milanov, Nikolay and Koch, Christian and Hausheer, David and Mühlhäuser, Max (2015):
ID2T: A DIY Dataset Creation Toolkit for Intrusion Detection Systems.
In: IEEE Conference on Communications and Network Security (CNS 2015), Florence, Italy, 28.-30. Sept., pp. 739 - 740, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346912,
[Online-Edition: https://ieeexplore.ieee.org/document/7346912],
[Conference or Workshop Item]

Abstract

Intrusion Detection Systems (IDSs) are an important defense tool against the sophisticated and ever-growing network attacks. These systems need to be evaluated against high quality datasets for correctly assessing their usefulness and comparing their performance. We present an Intrusion Detection Dataset Toolkit (ID2T) for the creation of labeled datasets containing user defined synthetic attacks. The architecture of the toolkit is provided for examination and the example of an injected attack, in real network traffic, is visualized and analyzed. We further discuss the ability of the toolkit of creating realistic synthetic attacks of high quality and low bias.

Item Type: Conference or Workshop Item
Erschienen: 2015
Creators: Garcia Cordero, Carlos and Vasilomanolakis, Emmanouil and Milanov, Nikolay and Koch, Christian and Hausheer, David and Mühlhäuser, Max
Title: ID2T: A DIY Dataset Creation Toolkit for Intrusion Detection Systems
Language: English
Abstract:

Intrusion Detection Systems (IDSs) are an important defense tool against the sophisticated and ever-growing network attacks. These systems need to be evaluated against high quality datasets for correctly assessing their usefulness and comparing their performance. We present an Intrusion Detection Dataset Toolkit (ID2T) for the creation of labeled datasets containing user defined synthetic attacks. The architecture of the toolkit is provided for examination and the example of an injected attack, in real network traffic, is visualized and analyzed. We further discuss the ability of the toolkit of creating realistic synthetic attacks of high quality and low bias.

ISBN: 978-1-4673-7876-5
Uncontrolled Keywords: - SSI - Area Secure Smart Infrastructures;Secure Services
Divisions: 18 Department of Electrical Engineering and Information Technology
18 Department of Electrical Engineering and Information Technology > Institute of Computer Engineering
18 Department of Electrical Engineering and Information Technology > Institute of Computer Engineering > Peer-to-Peer Systems Engineering
20 Department of Computer Science
20 Department of Computer Science > Telecooperation
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
Event Title: IEEE Conference on Communications and Network Security (CNS 2015)
Event Location: Florence, Italy
Event Dates: 28.-30. Sept.
Date Deposited: 19 Apr 2016 13:48
DOI: 10.1109/CNS.2015.7346912
Official URL: https://ieeexplore.ieee.org/document/7346912
Additional Information:

FG Entwurfsmethodik für P2P Systeme

Identification Number: TUD-CS-2015-1184
Related URLs:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)

View Item View Item