Title:
Intrusion Detection Testing and Benchmarking Methodologies
Intrusion Detection Testing and Benchmarking Methodologies
dc.contributor.author | Athanasiades, Nicholas | |
dc.contributor.author | Abler, Randal T. | |
dc.contributor.author | Levine, John G. (John Glenn) | |
dc.contributor.author | Owen, Henry L., III | |
dc.contributor.author | Riley, George F. | |
dc.contributor.corporatename | Georgia Institute of Technology. School of Electrical and Computer Engineering | |
dc.date.accessioned | 2007-01-11T22:04:28Z | |
dc.date.available | 2007-01-11T22:04:28Z | |
dc.date.issued | 2003-03 | |
dc.description | ©2003 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or distribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. | en |
dc.description | Presented at the First IEEE International Workshop on Information Assurance (IWIAS), 2003 | |
dc.description.abstract | The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algorithms and approaches. After conducting a survey of the literature on the methods and techniques being used, it can be seen that a new approach that incorporates an open source testing methodology and environment would benefit the information assurance community. After summarizing the literature and presenting several example test and evaluation environments that have been used in the past, we propose a new open source evaluation environment and methodology for use by researchers and developers of new intrusion detection and denial of service detection and prevention algorithms and methodologies. | en |
dc.format.extent | 298726 bytes | |
dc.format.mimetype | application/pdf | |
dc.identifier.uri | http://hdl.handle.net/1853/13151 | |
dc.language.iso | en_US | en |
dc.publisher | Georgia Institute of Technology | en |
dc.publisher.original | Institute of Electrical and Electronics Engineers, Inc., New York | |
dc.subject | Computer crime | en |
dc.subject | Computer networks | en |
dc.subject | Program testing | en |
dc.subject | Public domain software | en |
dc.subject | Telecommunication security | en |
dc.title | Intrusion Detection Testing and Benchmarking Methodologies | en |
dc.type | Text | |
dc.type.genre | Proceedings | |
dspace.entity.type | Publication | |
local.contributor.author | Owen, Henry L., III | |
local.contributor.corporatename | School of Electrical and Computer Engineering | |
local.contributor.corporatename | College of Engineering | |
relation.isAuthorOfPublication | d3983de1-d725-47f4-b653-a318b39d8fd9 | |
relation.isOrgUnitOfPublication | 5b7adef2-447c-4270-b9fc-846bd76f80f2 | |
relation.isOrgUnitOfPublication | 7c022d60-21d5-497c-b552-95e489a06569 |