Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems

被引:15
|
作者
Nash, DA [1 ]
Ragsdale, DJ
机构
[1] US Mil Acad, Dept Elect Engn & Comp Sci, W Point, NY 10996 USA
[2] US Mil Acad, Informat Technol & Operat Ctr, W Point, NY 10996 USA
来源
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS | 2001年 / 31卷 / 04期
关键词
hurst parameter; self-similarity; simulated network traffic automatic testing;
D O I
10.1109/3468.935051
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The behavior of a certain class of automatic intrusion detection systems (IDSs) may be characterized as sensing patterns of network activity which are indicative of hostile intent. An obvious technique to test such a system is to engage the IDSs of interest, and then use human actors to introduce the activities of a would-be intruder. While having the advantage of realism, such an approach is difficult to scale to large numbers of intrusive behaviors. Instead it would be preferable to generate traffic which includes these manifestations of intrusive activity automatically, While such traffic would be difficult to produce in a totally general way, there are some aspects of network utilization which may be reproducible without excessive investment of resources. In particular, real network loading often exhibits patterns of self-similarity, which may be seen at various levels of time scaling. These patterns should be replicated in simulated network traffic as closely as is feasible, given the computational ability of the simulator. This motivates interest in an efficient way to detect multiscale phenomena in network traffic, as well as a means to create simulated traffic that exhibits the desired characteristics. We propose the use of multiresolution wavelet analysis as a technique which may be used to accomplish the desired detection, and subsequent construction of self-similarity in the simulated traffic. Following a multiresolution decomposition of the traffic using an orthogonal filterbank, the resulting wavelet coefficients may be filtered according to their magnitude. Some of the coefficients may be discarded, yielding an efficient representation. We investigate the effect of compression upon the reconstructed signal's self-similarity, as measured by its estimated Hurst parameter.
引用
收藏
页码:327 / 331
页数:5
相关论文
共 6 条
  • [1] On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems
    Allen, WH
    Marin, GA
    2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 2003, : 242 - 248
  • [2] Self-similarity based lightweight intrusion detection method
    Kwon, Hyukmin
    Kim, Eunjin
    Yu, Song Jin
    Kim, Huy Kang
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (11): : 3683 - 3690
  • [3] An Intrusion Alarming System Based on Self-Similarity of Network Traffic
    YU Fei 1
    2. Computer and Communication Institute
    Wuhan University Journal of Natural Sciences, 2005, (01) : 169 - 173
  • [4] Self-similarity based network anomaly detection for industrial control systems
    Martin, Bryan
    Bollmann, Chad A.
    2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,
  • [5] Self-similarity Based Lightweight Intrusion Detection Method for Cloud Computing
    Kwon, Hyukmin
    Kim, Taesu
    Yu, Song Jin
    Kim, Huy Kang
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2011, PT II, 2011, 6592 : 353 - 362
  • [6] Network Traffic Anomaly Detection Based on Self-similarity Using FRFT
    Ye, Xiaolong
    Lan, Julong
    Huang, Wanwei
    PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 837 - 840