23,399 Hits in 5.3 sec

Air Force Intrusion Detection System Evaluation Environment

Terrence G. Champion, Robert Durst
1999 International Symposium on Recent Advances in Intrusion Detection  
We also thank all parties who provided ID systems for evaluation in the 1998 test, specifically:  ...  The Air Force Research Laboratory (AFRL) INFOSEC Technology Office has volunteered to regularly test and evaluate these emerging ID systems for possible insertion into critical national networks.  ...  To evaluate systems that use the statistical properties of network traffic to look for anomalies that might indicate an intrusion or misuse, AFRL needed an environment that could produce enough data to  ... 
dblp:conf/raid/ChampionD99 fatcat:lqx7uwmp5netjm46vxbaprcuu4

Feature Selection in the Corrected KDD-dataset

Shahrzad Zargari, Dave Voorhis
2012 2012 Third International Conference on Emerging Intelligent Data and Web Technologies  
Air Force LAN. The LAN was operated as if it were a true Air Force environment, but peppered it with multiple attacks.  ...  Introduction Intrusion detection systems Signature Anomaly Hybrid Anomaly intrusion detection deals with detecting of unknown attacks in the network traffic, therefore, they are difficult to identify without  ...  For future work, finding the optimum subset of features to be used in intrusion detection  ... 
doi:10.1109/eidwt.2012.10 dblp:conf/eidwt/ZargariV12 fatcat:3f3wpnxxrjc25kzmb6uukjjtdm

Mobile detection assessment and response systems (MDARS): a force protection physical security operational success

Brian Shoop, Michael Johnston, Richard Goehring, Jon Moneyhun, Brian Skibba, Grant R. Gerhart, Charles M. Shoemaker, Douglas W. Gage
2006 Unmanned Systems Technology VIII  
The first was the USAF Force Protection Battle Lab sponsored Remote Detection Challenge & Response (REDCAR) concept demonstration executed by the Air Force Robotics Lab (AFRL).  ...  MDARS is a Semi-autonomous unmanned ground vehicle with intrusion detection & assessment, product & barrier assessment payloads.  ...  The REDCAR project is an Air Force Battle Lab concept evaluation program initiative in response to the Air Force Integrated Base Defense requirement, to provide a robotic component to overall base security  ... 
doi:10.1117/12.665939 fatcat:raxtu25mcbeyphwz5qkisx7nri

Anomaly Intrusion Detection System Using Gaussian Mixture Model

M. Bahrololum, M. Khaleghi
2008 2008 Third International Conference on Convergence and Hybrid Information Technology  
Intrusion Detection Systems have been widely used to overcome security threats in computer networks and to identify unauthorized use, misuse, and abuse of computer systems.  ...  Anomaly-based approaches in Intrusion Detection Systems have the advantage of being able to detect unknown attacks; they look for patterns that deviate from the normal behavior.  ...  Air Force LAN. They operated the LAN as if it were a true Air Force environment, but peppered it with multiple attacks.  ... 
doi:10.1109/iccit.2008.17 fatcat:s566ekhbybht3pwpq62337354y


Grigore Eduard JELER, "Ferdinand I" Military Technical Academy, Bucharest, Romania, Gelu ALEXANDRESCU, "Carol I" National Defence University, Bucharest, Romania
2020 Review of the Air Force Academy  
This article presents some possibilities for the use of autonomous systems: protection of military bases, protection and automation of air bases and use of autonomous convoys.  ...  For this reason, autonomous systems with increased remote sensing, monitoring and even equipment with lethal armament offer a promising means of extending protection with limited human resources.  ...  -UGV (Unmanned Ground Vehicle): within the base security missions this autonomous system is equipped with useful tasks for intrusion detection and evaluation, and physical response possibilities [4] .  ... 
doi:10.19062/1842-9238.2020.18.1.2 fatcat:zmkfjtlokzfutlib6aomdr4dci

A Lightweight Signature-Based IDS for IoT Environment [article]

Nazim Uddin Sheikh, Hasina Rahman, Shashwat Vikram, Hamed AlQahtani
2018 arXiv   pre-print
Furthermore, we propose an Intrusion Detection System (IDS) methodology and design architecture for Internet of Things that makes the use of this search algorithm to thwart various security breaches.  ...  In this paper we demonstrate the use of an optimized pattern recognition algorithm to detect such attacks.  ...  Laboratory (AFRL), United States in the year 1999 for the evaluation of computer network intrusion detection systems.  ... 
arXiv:1811.04582v1 fatcat:lavn7e6pabdbtgg5nn67eon74u

Intrusion detection testing and benchmarking methodologies

N. Athanasiades, R. Abler, J. Levine, H. Owen, G. Riley
2003 First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings.  
The ad-hoc methodology that is prevalent in today's testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algorithms and approaches.  ...  use by researchers and developers of new intrusion detection and denial of service detection and prevention algorithms and methodologies.  ...  EXAMPLES OF INTRUSION DETECTION EVALUATION ENVIRONMENTS In the following subsections, we summarize five environments that have been used to evaluate intrusion detection systems.  ... 
doi:10.1109/iwias.2003.1192459 dblp:conf/iwia/AthanasiadesALOR03 fatcat:2k2rajfvrven5gb7kssnzizb6i

Performance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System

B. Abdullah, I. Abd-alghafar, Gouda Salama, A. Abd-alhafez
2009 International Conference on Aerospace Sciences and Aviation Technology  
The purpose of the work described in this paper is to provide an intrusion detection system (IDS), by applying genetic algorithm (GA) to network intrusion detection system.  ...  This approach applied to the KDD99 benchmark dataset and obtained high detection rate up to 99.87% as well as low false positive rate 0.003%.  ...  Air Force LAN. The LAN was operated as if it were a true Air Force environment, peppered with multiple attacks. Hence, this is a high confidence and high quality data set.  ... 
doi:10.21608/asat.2009.23490 fatcat:3lfkp63gcnfd7ermvfvivqqd4e

Security Threats Recognition and Countermeasures on Smart Battlefield Environment based on IoT

Jung ho Eom
2015 International Journal of Security and Its Applications  
The IoT technology provides networking service to connect each other unmanned combat system.  ...  And we propose countermeasures in response to these security threats; authentication, access control, intrusion prevention, and cryptography technology.  ...  Intrusion detection is to detect attacks in Table 1 .  ... 
doi:10.14257/ijsia.2015.9.7.32 fatcat:ptpety7kifdcxac2bbcj64myly

Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory

John McHugh
2000 ACM Transactions on Privacy and Security  
In 1998 and again in 1999, the Lincoln Laboratory of MIT conducted a comparative evaluation of intrusion detection systems (IDSs) developed under DARPA funding.  ...  The appropriateness of the evaluation techniques used needs further investigation.  ...  The real-time evaluation of IDSs conducted by AFRL (Air Force Research Laboratory) [Durst et al. 1999] has not been considered.  ... 
doi:10.1145/382912.382923 fatcat:sxl5ocew3vflteu4mm7ge674gy

Evidence of a sewer vapor transport pathway at the USEPA vapor intrusion research duplex

Thomas McHugh, Lila Beckley, Terry Sullivan, Chris Lutes, Robert Truesdale, Rob Uppencamp, Brian Cosky, John Zimmerman, Brian Schumacher
2017 Science of the Total Environment  
We have used a tracer studyand VOC concentration measurements to evaluate the role of the combined sanitary/storm sewer line in VOC transport at the USEPA vapor intrusion research duplex in Indianapolis  ...  vapor intrusion investigations.  ...  Department of Defense, through Environmental Security Technology Certification Program (ESTCP) Project ER-201505 and in part by the USEPA through its Office of Research and Development under contract EP-C  ... 
doi:10.1016/j.scitotenv.2017.04.135 pmid:28456127 pmcid:PMC6084445 fatcat:dd2gs54chzbztgcb6k7xdv6ke4

Feedback Reliability Ratio of an Intrusion Detection System

Usha Banerjee, Gaurav Batra, K. V. Arya
2012 Journal of Information Security  
Therefore adaptability, or the ability to learn and react to a consistently changing threat environment, is a key requirement for modern intrusion detection systems.  ...  We propose a new metric called feedback reliability ratio for an intrusion detection system.  ...  ITO) and Air Force Research Laboratory (AFRL/SNHS) sponsorship in 1998 and 1999 [16] and [17] evaluation is used.  ... 
doi:10.4236/jis.2012.33030 fatcat:w5xl5hlu75fk5hbc2qz574opb4

Mitigating Denial-of-Service Attacks Using Genetic Approach

Mr. Anurag Andhare
2012 IOSR Journal of Engineering  
A short general idea of Intrusion Detection System, genetic algorithm and related detection techniques is provided.  ...  The GA will be trained on the KDD Cup 99 data set to generate a rule set that can be used to identify attacks on the system.  ...  Air Force LAN. The LAN was operated as if it were a true Air Force environment, peppered with multiple attacks. Hence, this is a high confidence and high quality data set.  ... 
doi:10.9790/3021-0203468472 fatcat:rddghklaczhoxg2wihr3g5yk5u

Relevant Feature Selection Model Using Data Mining for Intrusion Detection System

Ayman I. Madbouly, Amr M. Gody, Tamer M. Barakat
2014 International Journal of Engineering Trends and Technoloy  
Our goal is to build a lightweight intrusion detection system by using a reduced features set.  ...  Intrusion detection system (IDS) has been widely deployed as a defense measure for computer networks. Features extracted from network traffic can be used as sign to detect anomalies.  ...  In DARPA program the simulation LAN was operated as if it were a true Air Force environment LAN, but peppered it with multiple attacks.  ... 
doi:10.14445/22315381/ijett-v9p296 fatcat:k3fgyvkiirfufouteft5wiz6yy

Towards Improved Random Forest based Feature Selection for Intrusion Detection in Smart IOT Environment

Henceforth, feature extraction using machine learning approaches for modelling of Intrusion detection system (IDS) have been cast off for identification of threats in IoT devices.  ...  In this investigation, Kaggle dataset is measured as benchmark dataset for detecting intrusion is considered initially. These dataset includes 41 essential attributes for intrusion identification.  ...  It generates a situation to attain TCP/IP based data by executing US based LAN Air force. Here, it is concentrated in real environment and blasted with numerous attacks.  ... 
doi:10.35940/ijitee.f1446.0981119 fatcat:3pwdo5khtnam3imeazb4xr7pzy
« Previous Showing results 1 — 15 out of 23,399 results