On the testing of network cyber threat detection methods on spam example

被引:6
作者
Filasiak, Robert [1 ]
Grzenda, Maciej [1 ,2 ]
Luckner, Marcin [2 ]
Zawistowski, Pawel [3 ]
机构
[1] Orangel Labs Poland, PL-02691 Warsaw, Poland
[2] Warsaw Univ Technol, Fac Math & Informat Sci, PL-00662 Warsaw, Poland
[3] Warsaw Univ Technol, Fac Elect & Informat Technol, PL-00665 Warsaw, Poland
关键词
Network Intrusion Detection Systems (NIDS); Flow analysis; Spam detection; Network data sets; IMPLEMENTATION;
D O I
10.1007/s12243-013-0412-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As a response to the increasing number of cyber threats, novel detection and prevention methods are constantly being developed. One of the main obstacles hindering the development and evaluation of such methods is the shortage of reference data sets. What is proposed in this work is a way of testing methods detecting network threats. It includes a procedure for creating realistic reference data sets describing network threats and the processing and use of these data sets in testing environments. The proposed approach is illustrated and validated on the basis of the problem of spam detection. Reference data sets for spam detection are developed, analysed and used to both generate the requested volume of simulated traffic and analyse it using machine learning algorithms. The tests take into account both the accuracy and performance of threat detection methods under real load and constrained computing resources.
引用
收藏
页码:363 / 377
页数:15
相关论文
共 23 条
[1]  
[Anonymous], 1984, OLSHEN STONE CLASSIF, DOI 10.2307/2530946
[2]  
Behera G, 2011, EM TRENDS APPL COMP, P1
[3]   Logic Synthesis Method for Pattern Matching Circuits Implementation in FPGA with Embedded Memories [J].
Borowik, Grzegorz ;
Luba, Tadeusz ;
Falkowski, Bogdan J. .
PROCEEDINGS OF THE 2009 IEEE SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS AND SYSTEMS, 2009, :230-+
[4]  
Boutaba R, 2004, ANN TELECOMMUN, V59, P505
[5]  
Grzenda M, 2012, LECT NOTES COMPUT SC, V7209, P68
[6]   Towards real-time anomalies monitoring for QoE indicators [J].
Guyard, Frederic ;
Beker, Sergio .
ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2010, 65 (1-2) :59-71
[7]  
Karnouskos S, 2004, ANN TELECOMMUN, V59, P525
[8]   Packet Header Analysis and Field Extraction for Multigigabit Networks [J].
Kobiersky, Petr ;
Korenek, Jan ;
Polcak, Libor .
PROCEEDINGS OF THE 2009 IEEE SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS AND SYSTEMS, 2009, :96-+
[9]  
Limwiwatkul L, 2004, IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2, P605
[10]   When should I use network emulation? [J].
Lochin, Emmanuel ;
Perennou, Tanguy ;
Dairaine, Laurent .
ANNALS OF TELECOMMUNICATIONS, 2012, 67 (5-6) :247-255