On the testing of network cyber threat detection methods on spam example

被引:0
作者
Robert Filasiak
Maciej Grzenda
Marcin Luckner
Pawel Zawistowski
机构
[1] Orangel Labs Poland,Faculty of Mathematics and Information Science
[2] Warsaw University of Technology,Faculty of Electronics and Information Technology
[3] Warsaw University of Technology,undefined
来源
annals of telecommunications - annales des télécommunications | 2014年 / 69卷
关键词
Network Intrusion Detection Systems (NIDS); Flow analysis; Spam detection; Network data sets;
D O I
暂无
中图分类号
学科分类号
摘要
As a response to the increasing number of cyber threats, novel detection and prevention methods are constantly being developed. One of the main obstacles hindering the development and evaluation of such methods is the shortage of reference data sets. What is proposed in this work is a way of testing methods detecting network threats. It includes a procedure for creating realistic reference data sets describing network threats and the processing and use of these data sets in testing environments. The proposed approach is illustrated and validated on the basis of the problem of spam detection. Reference data sets for spam detection are developed, analysed and used to both generate the requested volume of simulated traffic and analyse it using machine learning algorithms. The tests take into account both the accuracy and performance of threat detection methods under real load and constrained computing resources.
引用
收藏
页码:363 / 377
页数:14
相关论文
共 15 条
[1]  
Boutaba R(2004)Active networks as a developing and testing environment for network protocols Ann Telecommun 59 505-524
[2]  
Polyrakis A(2010)Towards real-time anomalies monitoring for QoE indicators Ann Telecommun 65 59-71
[3]  
Casani A(2004)Community aware network security and a DDoS response system Ann Telecommun 59 525-542
[4]  
Guyard F(2012)When should I use network emulation? Ann Telecommun 67 247-255
[5]  
Beker S(2010)Toward credible evaluation of anomaly-based intrusion-detection methods IEEE Trans Syst Man Cybern Part C Appl Rev 40 516-524
[6]  
Karnouskos S(2013)A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks IEEE Commun Surv Tutor 15 2046-2069
[7]  
Lochin E(undefined)undefined undefined undefined undefined-undefined
[8]  
Prennou T(undefined)undefined undefined undefined undefined-undefined
[9]  
Dairaine L(undefined)undefined undefined undefined undefined-undefined
[10]  
Tavallaee M(undefined)undefined undefined undefined undefined-undefined