A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Results of the DARPA 1998 Offline Intrusion Detection Evaluation
1999
International Symposium on Recent Advances in Intrusion Detection
DARPA sponsored the first realistic and systematic evaluation of research intrusion detection systems in 1998. ...
Six DARPA research sites participated in a blind evaluation where test data was provided without specifying the location of embedded attacks. ...
Acknowledgements This work was co-sponsored by the Defense Advanced Research Projects Agency and the Dept. of the Air Force. ...
dblp:conf/raid/LippmannCFGKWZ99
fatcat:lz56x32la5flzmx4s6qbzwbyyi
Recent Advances in Network Intrusion Detection System Tuning
2006
2006 40th Annual Conference on Information Sciences and Systems
, the DARPA Intrusion Detection Evaluation data sets provided by Lincoln Lab, and a suite of malicious traffic modules that reproduce a broad range of attacks commonly seen in today's networks. ...
Our experiments demonstrate the effects of varying packet content, mix, and volume on the performance of intrusion detection systems. ...
The most notable exceptions are the well known DARPA data sets developed at Lincoln Lab in 1998-1999 for offline NIDS testing [2] , [3] . ...
doi:10.1109/ciss.2006.286375
fatcat:wyuunivcejawlm6u3nx5ftfyoy
Usefulness of DARPA dataset for intrusion detection system evaluation
2008
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008
The MIT Lincoln Laboratory IDS evaluation methodology is a practical solution in terms of evaluating the performance of Intrusion Detection Systems, which has contributed tremendously to the research progress ...
The paper presented here tries to provide supporting facts for the use of the DARPA IDS evaluation dataset. ...
They have used this system to evaluate a few of the research systems, with results similar to those obtained in the offline evaluation. ...
doi:10.1117/12.777341
dblp:conf/dmkdttt/ThomasS008
fatcat:sg65js4jlneytfdbbaqmx6og3u
La Construcción de un Sistema de Detección de Intrusos con Xfuzzy
2003
Zenodo
Technical Report TR CS98-605, Department of Com-
puter Science and Engineering, University of California at San Diego.
Graf, I. (1998). Results of DARPA 1998 Offline Intrusion Detection
Evaluation. ...
The 1998 DARPA/ AFRL Off-line Intrusion De-
tection Evaluation. In Proceedings of the First International Work-
shop on Recent Advances in Intrusion Detection (RAID'98). ...
doi:10.5281/zenodo.5105903
fatcat:x3xp4v7pozdqnozsyzinao5dwm
PERFORMANCE EVALUATION OF ADVANCED INTRUSION DETECTION SYSTEM
2018
International Journal of Research in Engineering and Technology
This paper also considers KDD Cup 1999 information set keeping in mind the end goal to show the profits of the proposed intrusion detection system described in the KDD Cup record previously. ...
False alert rate, area under ROC curve, accuracy, recall, Fscore, and P-test are the parameters used to evaluate the effectiveness of hybrid IDS. ...
Usefulness of KDD Cup 1999 Data Set for IDS Evaluation The KDD cup data set is originated based on the DARPA data set and mainly, it was used to construct a network intrusion detection as identification ...
doi:10.15623/ijret.2018.0710003
fatcat:xrylpguxsjaxlgj72f5syi2h3a
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)
2019
Journal of Information Security
KDD Cup 99 and 1998 DARPA dataset were employed for training and testing the intrusion detection rules. ...
However, GA's traditional Fitness Function was improved in order to evaluate the efficiency and effectiveness of the algorithm in classifying network attacks from KDD Cup 99 and 1998 DARPA dataset. ...
And thus, 1998 DARPA Dataset (Defense Advanced Research Projects
Agency) was invented in 1998 by MIT Lincoln Labs for the purpose of evaluat-
ing intrusion detection systems on offline environment. ...
doi:10.4236/jis.2019.101001
fatcat:fwaa76rvtnbibj4o44nxjx3gvy
Intrusion detection testing and benchmarking methodologies
2003
First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings.
The ad-hoc methodology that is prevalent in today's testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algorithms and approaches. ...
use by researchers and developers of new intrusion detection and denial of service detection and prevention algorithms and methodologies. ...
DARPA Environment The DARPA 1998 and 1999 intrusion detection evaluations represent the first significantly systematic effort to test intrusion detection systems. ...
doi:10.1109/iwias.2003.1192459
dblp:conf/iwia/AthanasiadesALOR03
fatcat:2k2rajfvrven5gb7kssnzizb6i
Performance Evaluation of Network Intrusion Detection System for Detecting Zero-Day Attacks: SNORT-XSS Algorithm
2022
Review of Computer Engineering Research
The main objective of Intrusion Detection and Prevention Systems is to provide a method of detecting and preventing malicious behaviors in a network system to minimize the harm caused by attackers. ...
The experimental results achieved by preprocessing anomalous behaviors in a network and the detection rate of zero-day attacks or novel attacks were very promising and were beyond expectations. ...
evaluating the system. ...
doi:10.18488/76.v9i2.3082
fatcat:p4ujlkipibdfjjb5d7euhpovk4
Network Anomaly Detection Based on Wavelet Analysis
2008
EURASIP Journal on Advances in Signal Processing
We then evaluate our approach with the 1999 DARPA intrusion detection dataset and conduct a comprehensive analysis of the intrusions in the dataset. ...
Evaluation results show that the approach achieves high-detection rates in terms of both attack instances and attack types. ...
The 1999 DARPA intrusion detection dataset is one of the first standard corpuses used for evaluating intrusion detection approaches offline [29] and it includes 5 weeks of sniffed traffic (tcpdump files ...
doi:10.1155/2009/837601
fatcat:4hj4rvwi6vbv3entvnnanbqsku
Unsupervised anomaly detection using an evolutionary extension of k-means algorithm
2008
International Journal of Information and Computer Security
In the first experiment, we conduct an offline evaluation based on a subset of 1998 DARPA intrusion detection dataset, which detects 18 types of attacks out of a total of 19 network attack types. ...
Intrusion decisions are made based on the clustering result. Two sets of experiments are conducted in order to evaluate our framework. ...
Offline evaluation The 1998 DARPA intrusion detection dataset is the first standard corpus used for evaluating intrusion detection approaches offline (Kendall 1998) . ...
doi:10.1504/ijics.2008.018513
fatcat:45gkcl6twffzrndqluikh3xvhm
Anomaly-based network IDS false alarm filter using cluster-based alarm classification approach
2017
International Journal of Security and Networks (IJSN)
Large amounts of false alarms prevent correct detection and make an immediate response impossible for intrusion detection system (IDS). ...
To mitigate this issue, this paper presents a strategy for filtering these alarms to reduce the rate of false-positive alarms of A-NIDS. ...
The DARPA/Lincoln Laboratory IDS Evaluation dataset was used to evaluate the performance of the PHAD (Mahoney and Chan, 1998) . ...
doi:10.1504/ijsn.2017.081056
fatcat:gvgecypcyzcxzgifsad3ctc3bm
Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions
2018
Journal of Computer Networks and Communications
We provide background, enthusiasm, discussion of challenges, and recommendations for the application of ML/DM in the field of intrusion detection. ...
Intrusion detection, an important entity towards network security, has the ability to observe network activity as well as detect intrusions/attacks. ...
Conflicts of Interest e authors declare that there are no conflicts of interest regarding the publication of this paper. ...
doi:10.1155/2018/6383145
fatcat:cm7ncpbgdja2nlvbooddp5tgb4
Systematic Review and Quantitative Comparison of Cyberattack Scenario Detection and Projection
2020
Electronics
This survey provides an overview of the state of the art in detecting and projecting cyberattack scenarios, with a focus on evaluation and the corresponding metrics. ...
Intrusion Detection Systems (IDSs) automatically analyze event logs and network traffic in order to detect malicious activity and policy violations. ...
Darpa Intrusion Detection Evaluation Datasets The first widely used dataset for IDS evaluation is DARPA1998, published by the MIT Lincoln laboratory in 1998. ...
doi:10.3390/electronics9101722
fatcat:h7ufrdrhhrbxtn27337gjzvr3i
An Intrusion Detection System using KNN-ACO Algorithm
2017
International Journal of Computer Applications
In this paper, proposes a SVM and KNN-ACO method for the intrusion detection and the analysis of this is perform using KDD1999 Cup dataset. ...
An Intrusion Detection System (IDS) participates a noteworthy responsibility in detecting anomalies and attacks over's network. ...
The offline intrusion revealing 1998 evaluation was the most important in an intended series of yearly appraisal accomplished by the Massachusetts Institute of Technology Lincoln Laboratories under DARPA ...
doi:10.5120/ijca2017914079
fatcat:o6zmsjs5gbaevgdorg3atkjeyy
Neural projection techniques for the visual inspection of network traffic
2009
Neurocomputing
The empirical verification of the projection methods involved two experimental domains derived from the standard corpora for evaluation of computer network intrusion detection: the MIT Lincoln Laboratory ...
The proposed methods have been evaluated in two complementary and practical networksecurity scenarios: the on-line processing of network traffic at packet level, and the offline processing of connection ...
This research has been partially supported by the project BU006A08 of the JCyL. ...
doi:10.1016/j.neucom.2008.12.038
fatcat:vi55fw5osrawhi3ijw3zswosga
« Previous
Showing results 1 — 15 out of 292 results