Title:
Intrusion Detection Testing and Benchmarking Methodologies

dc.contributor.author Athanasiades, Nicholas
dc.contributor.author Abler, Randal T.
dc.contributor.author Levine, John G. (John Glenn)
dc.contributor.author Owen, Henry L., III
dc.contributor.author Riley, George F.
dc.contributor.corporatename Georgia Institute of Technology. School of Electrical and Computer Engineering
dc.date.accessioned 2007-01-11T22:04:28Z
dc.date.available 2007-01-11T22:04:28Z
dc.date.issued 2003-03
dc.description ©2003 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or distribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. en
dc.description Presented at the First IEEE International Workshop on Information Assurance (IWIAS), 2003
dc.description.abstract The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algorithms and approaches. After conducting a survey of the literature on the methods and techniques being used, it can be seen that a new approach that incorporates an open source testing methodology and environment would benefit the information assurance community. After summarizing the literature and presenting several example test and evaluation environments that have been used in the past, we propose a new open source evaluation environment and methodology for use by researchers and developers of new intrusion detection and denial of service detection and prevention algorithms and methodologies. en
dc.format.extent 298726 bytes
dc.format.mimetype application/pdf
dc.identifier.uri http://hdl.handle.net/1853/13151
dc.language.iso en_US en
dc.publisher Georgia Institute of Technology en
dc.publisher.original Institute of Electrical and Electronics Engineers, Inc., New York
dc.subject Computer crime en
dc.subject Computer networks en
dc.subject Program testing en
dc.subject Public domain software en
dc.subject Telecommunication security en
dc.title Intrusion Detection Testing and Benchmarking Methodologies en
dc.type Text
dc.type.genre Proceedings
dspace.entity.type Publication
local.contributor.author Owen, Henry L., III
local.contributor.corporatename School of Electrical and Computer Engineering
local.contributor.corporatename College of Engineering
relation.isAuthorOfPublication d3983de1-d725-47f4-b653-a318b39d8fd9
relation.isOrgUnitOfPublication 5b7adef2-447c-4270-b9fc-846bd76f80f2
relation.isOrgUnitOfPublication 7c022d60-21d5-497c-b552-95e489a06569
Files
Original bundle
Now showing 1 - 1 of 1
Thumbnail Image
Name:
MANIACS_23.pdf
Size:
291.72 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.8 KB
Format:
Item-specific license agreed upon to submission
Description: