skip to main content
10.1145/1852666.1852720acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Plug & execute framework for network traffic generation

Published:21 April 2010Publication History

ABSTRACT

Evaluating IDS algorithms and systems is often an ad-hoc process and makes it hard to compare evaluation results and performance of IDS systems. There is a need for divers and realistic test traffic and for developing metrics to be able to judge whether some generated traffic is a representative sample of observed traffic. In this paper, the authors propose a framework for a network traffic generator which creates diverse traffic through a variety of traffic sources and describe a working implementation of it. The lessons learned from this experience can serve as the basis to create a detailed specification for an open-source implementation of the framework.

Skip Supplemental Material Section

Supplemental Material

References

  1. Athanasiades, N., Abler, R., Levine, J., Owen, H., and Riley, G. 2003. Intrusion Detection Testing and Benchmarking Methodologies, Proc 1st IEEE Int'natl Workshop on Information Assurance (IWIA '03), p. 63--72. http://doi.acm.org/857183.857559 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Brugger, T. 2007. An Approach for Computer Network Comparison. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.89.8911Google ScholarGoogle Scholar
  3. Chen, H., Al-Nashif, Y., Qu, G., and Hariri, S. 2007. Self-Configuration of Network Security, in Proc. 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 15--19 October 2007, Annapolis, Maryland, USA: 97--110 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. DETERnet Testbed http://www.isi.edu/deterGoogle ScholarGoogle Scholar
  5. Floyd, S. and Paxon, V. 2001. Difficulties in simulating the Internet, in IEEE/ACM Transaction on Network (TON), 2001, 9(4):393--403. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Gates, C. E. 2008. A Case Study in Testing a Network Security Algorithm, in Proceedings of the 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities. Innsbruck, Austria. March 18--20, 28. DOI=http://doi.acm.org/1390576.1390610 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Haines, J., Lippmann, R., Fried, D., Zissman, M., Tran, E., and Boswell, S. 2001. 1999 DARPA Intrusion Detection Evaluation: Design and Procedures, Lincoln Laboratory Technical Report 1062, MIT, 2001Google ScholarGoogle Scholar
  8. Hariri, S., Khargharia, B., Chen, H., Zhang, Y., Kim, B., Liu, H., and Parashar, M. 2006. The Autonomic Computing Paradigm, Cluster Computing: The Journal of Networks, Software Tools and Applications, Special Issue on Autonomic Computing, Vol. 9, No. 2, 2006, Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Hariri, S., Qu, G., Chen, H., Al-Nashif, Y., and Yousif, M. Autonomic Network Security Management: Design and Evaluation, Accepted by ACM Transactions on Autonomous and Adaptive Systems - Special Issue on Adaptive Learning in Autonomic Communication, 2007.Google ScholarGoogle Scholar
  10. Leland, W., Taqqu, M., Willinger, W., and Wilson, D. 1994. On the self-similar nature of Ethernet traffic (extended version), IEEE/ACM Trans. Networking, vol. 2, pp. 1--15, Feb. 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Luo, S. and Marin, G. 2005. G. Realistic Internet Traffic Simulation Through Mixture Modeling and A Case Study, Proceedings of the 2005 Winter Simulation Conference, M. E. Kuhl, N. M. Steiger, F. B. Armstrong, and J. A. Joines (eds.), 2005, pp 2408--2416 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Massicotti, F., Gagnon, F., Labiche, Y., Briand, L., and Couture, M. 2006. Automatic Evaluation of Intrusion Detection Systems, Proceedings of the 22nd Annual Computer Security Applications Conf., pp 361--70, DOI=http://doi.acm.org/1191891 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Mutz, D., Vigna, G., and Kemmerer, R. 2003. An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems, Annual Computer Security Conf, Las Vegas, NV, p. 374--83, DOI=http://doi.acm.org/956465 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. The Network Simulator -- ns-2 http://www.isi.edu/nsname/nsGoogle ScholarGoogle Scholar
  15. Vizsec datasets http://www.vizsec.org/datasetsGoogle ScholarGoogle Scholar
  16. Walsh, J. and Koconis, D. 2006. Background Traffic and Network IPS Testing, Technical Report of ICSAlabs, July 2006Google ScholarGoogle Scholar
  17. Yang, W., Gong, Y., Ding, W., and Wu, X. 2007. Network Traffic Emulation for IDS Evaluation, NPC '07, p. 608--612, DOI= http://doi.acm.org/1306873.1306988 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Yurcik, W., Woolam, C., Hellings, G., Khan, and L., Thuraisingham, B. 2008. Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case, Third International Conference on Availability, Reliability and Security, pp.237--244, 200 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Plug & execute framework for network traffic generation

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CSIIRW '10: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
      April 2010
      257 pages
      ISBN:9781450300179
      DOI:10.1145/1852666

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 April 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
    • Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader