A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Air Force Intrusion Detection System Evaluation Environment
1999
International Symposium on Recent Advances in Intrusion Detection
We also thank all parties who provided ID systems for evaluation in the 1998 test, specifically: ...
The Air Force Research Laboratory (AFRL) INFOSEC Technology Office has volunteered to regularly test and evaluate these emerging ID systems for possible insertion into critical national networks. ...
To evaluate systems that use the statistical properties of network traffic to look for anomalies that might indicate an intrusion or misuse, AFRL needed an environment that could produce enough data to ...
dblp:conf/raid/ChampionD99
fatcat:lqx7uwmp5netjm46vxbaprcuu4
Feature Selection in the Corrected KDD-dataset
2012
2012 Third International Conference on Emerging Intelligent Data and Web Technologies
Air Force
LAN. The LAN was operated as if it were a true Air Force environment, but
peppered it with multiple attacks. ...
Introduction Intrusion detection systems Signature Anomaly Hybrid Anomaly intrusion detection deals with detecting of unknown attacks in the network traffic, therefore, they are difficult to identify without ...
For future work, finding the optimum subset of features to be used in intrusion detection ...
doi:10.1109/eidwt.2012.10
dblp:conf/eidwt/ZargariV12
fatcat:3f3wpnxxrjc25kzmb6uukjjtdm
Mobile detection assessment and response systems (MDARS): a force protection physical security operational success
2006
Unmanned Systems Technology VIII
The first was the USAF Force Protection Battle Lab sponsored Remote Detection Challenge & Response (REDCAR) concept demonstration executed by the Air Force Robotics Lab (AFRL). ...
MDARS is a Semi-autonomous unmanned ground vehicle with intrusion detection & assessment, product & barrier assessment payloads. ...
The REDCAR project is an Air Force Battle Lab concept evaluation program initiative in response to the Air Force Integrated Base Defense requirement, to provide a robotic component to overall base security ...
doi:10.1117/12.665939
fatcat:raxtu25mcbeyphwz5qkisx7nri
Anomaly Intrusion Detection System Using Gaussian Mixture Model
2008
2008 Third International Conference on Convergence and Hybrid Information Technology
Intrusion Detection Systems have been widely used to overcome security threats in computer networks and to identify unauthorized use, misuse, and abuse of computer systems. ...
Anomaly-based approaches in Intrusion Detection Systems have the advantage of being able to detect unknown attacks; they look for patterns that deviate from the normal behavior. ...
Air Force LAN. They operated the LAN as if it were a true Air Force environment, but peppered it with multiple attacks. ...
doi:10.1109/iccit.2008.17
fatcat:s566ekhbybht3pwpq62337354y
USE OF AUTONOMOUS SYSTEMS IN THE PERFORMANCE OF SECURITY MISSIONS
2020
Review of the Air Force Academy
This article presents some possibilities for the use of autonomous systems: protection of military bases, protection and automation of air bases and use of autonomous convoys. ...
For this reason, autonomous systems with increased remote sensing, monitoring and even equipment with lethal armament offer a promising means of extending protection with limited human resources. ...
-UGV (Unmanned Ground Vehicle): within the base security missions this autonomous system is equipped with useful tasks for intrusion detection and evaluation, and physical response possibilities [4] . ...
doi:10.19062/1842-9238.2020.18.1.2
fatcat:zmkfjtlokzfutlib6aomdr4dci
A Lightweight Signature-Based IDS for IoT Environment
[article]
2018
arXiv
pre-print
Furthermore, we propose an Intrusion Detection System (IDS) methodology and design architecture for Internet of Things that makes the use of this search algorithm to thwart various security breaches. ...
In this paper we demonstrate the use of an optimized pattern recognition algorithm to detect such attacks. ...
Laboratory (AFRL), United States in the year 1999 for the evaluation of computer network intrusion detection systems. ...
arXiv:1811.04582v1
fatcat:lavn7e6pabdbtgg5nn67eon74u
Intrusion detection testing and benchmarking methodologies
2003
First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings.
The ad-hoc methodology that is prevalent in today's testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algorithms and approaches. ...
use by researchers and developers of new intrusion detection and denial of service detection and prevention algorithms and methodologies. ...
EXAMPLES OF INTRUSION DETECTION EVALUATION
ENVIRONMENTS In the following subsections, we summarize five environments that have been used to evaluate intrusion detection systems. ...
doi:10.1109/iwias.2003.1192459
dblp:conf/iwia/AthanasiadesALOR03
fatcat:2k2rajfvrven5gb7kssnzizb6i
Performance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System
2009
International Conference on Aerospace Sciences and Aviation Technology
The purpose of the work described in this paper is to provide an intrusion detection system (IDS), by applying genetic algorithm (GA) to network intrusion detection system. ...
This approach applied to the KDD99 benchmark dataset and obtained high detection rate up to 99.87% as well as low false positive rate 0.003%. ...
Air Force LAN. The LAN was operated as if it were a true Air Force environment, peppered with multiple attacks. Hence, this is a high confidence and high quality data set. ...
doi:10.21608/asat.2009.23490
fatcat:3lfkp63gcnfd7ermvfvivqqd4e
Security Threats Recognition and Countermeasures on Smart Battlefield Environment based on IoT
2015
International Journal of Security and Its Applications
The IoT technology provides networking service to connect each other unmanned combat system. ...
And we propose countermeasures in response to these security threats; authentication, access control, intrusion prevention, and cryptography technology. ...
Intrusion detection is to detect attacks in
Table 1 . ...
doi:10.14257/ijsia.2015.9.7.32
fatcat:ptpety7kifdcxac2bbcj64myly
Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
2000
ACM Transactions on Privacy and Security
In 1998 and again in 1999, the Lincoln Laboratory of MIT conducted a comparative evaluation of intrusion detection systems (IDSs) developed under DARPA funding. ...
The appropriateness of the evaluation techniques used needs further investigation. ...
The real-time evaluation of IDSs conducted by AFRL (Air Force Research Laboratory) [Durst et al. 1999] has not been considered. ...
doi:10.1145/382912.382923
fatcat:sxl5ocew3vflteu4mm7ge674gy
Evidence of a sewer vapor transport pathway at the USEPA vapor intrusion research duplex
2017
Science of the Total Environment
We have used a tracer studyand VOC concentration measurements to evaluate the role of the combined sanitary/storm sewer line in VOC transport at the USEPA vapor intrusion research duplex in Indianapolis ...
vapor intrusion investigations. ...
Department of Defense, through Environmental Security Technology Certification Program (ESTCP) Project ER-201505 and in part by the USEPA through its Office of Research and Development under contract EP-C ...
doi:10.1016/j.scitotenv.2017.04.135
pmid:28456127
pmcid:PMC6084445
fatcat:dd2gs54chzbztgcb6k7xdv6ke4
Feedback Reliability Ratio of an Intrusion Detection System
2012
Journal of Information Security
Therefore adaptability, or the ability to learn and react to a consistently changing threat environment, is a key requirement for modern intrusion detection systems. ...
We propose a new metric called feedback reliability ratio for an intrusion detection system. ...
ITO) and Air Force Research Laboratory (AFRL/SNHS) sponsorship in 1998 and 1999 [16] and [17] evaluation is used. ...
doi:10.4236/jis.2012.33030
fatcat:w5xl5hlu75fk5hbc2qz574opb4
Mitigating Denial-of-Service Attacks Using Genetic Approach
2012
IOSR Journal of Engineering
A short general idea of Intrusion Detection System, genetic algorithm and related detection techniques is provided. ...
The GA will be trained on the KDD Cup 99 data set to generate a rule set that can be used to identify attacks on the system. ...
Air Force LAN. The LAN was operated as if it were a true Air Force environment, peppered with multiple attacks. Hence, this is a high confidence and high quality data set. ...
doi:10.9790/3021-0203468472
fatcat:rddghklaczhoxg2wihr3g5yk5u
Relevant Feature Selection Model Using Data Mining for Intrusion Detection System
English
2014
International Journal of Engineering Trends and Technoloy
English
Our goal is to build a lightweight intrusion detection system by using a reduced features set. ...
Intrusion detection system (IDS) has been widely deployed as a defense measure for computer networks. Features extracted from network traffic can be used as sign to detect anomalies. ...
In DARPA program the simulation LAN was operated as if it were a true Air Force environment LAN, but peppered it with multiple attacks. ...
doi:10.14445/22315381/ijett-v9p296
fatcat:k3fgyvkiirfufouteft5wiz6yy
Towards Improved Random Forest based Feature Selection for Intrusion Detection in Smart IOT Environment
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Henceforth, feature extraction using machine learning approaches for modelling of Intrusion detection system (IDS) have been cast off for identification of threats in IoT devices. ...
In this investigation, Kaggle dataset is measured as benchmark dataset for detecting intrusion is considered initially. These dataset includes 41 essential attributes for intrusion identification. ...
It generates a situation to attain TCP/IP based data by executing US based LAN Air force. Here, it is concentrated in real environment and blasted with numerous attacks. ...
doi:10.35940/ijitee.f1446.0981119
fatcat:3pwdo5khtnam3imeazb4xr7pzy
« Previous
Showing results 1 — 15 out of 23,399 results