Characterizing The Effectiveness Of Network-Based Intrusion Detection Systems

2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018)(2018)

引用 6|浏览11
暂无评分
摘要
Network-based Intrusion Detection Systems (NIDSs) must detect and defend against many kinds of attacks. These defenses are certainly limited in their capabilities; however, there is a lack of precise understanding of their strengths and weaknesses. In particular, there are two kinds of NIDSs, flow-based vs. packet-based, whose effectiveness needs to be systematically characterized using real, or as real as possible, datasets with known ground truth. In this paper, we report our empirical study on using a modern dataset, with known ground truth about the attacks it contains, to evaluate the effectiveness of flow-based vs. packet-based NIDSs. This allows us to draw initial insights towards the ultimate characterization of the gap between flow-based and packet-based NIDSs.
更多
查看译文
关键词
Intrusion Detection, Intrusion Detection Systems, Security Metrics, Snort, Suricata, Flow-based, Packet-based
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要