19th Annual Computer Security Applications Conference, 2003. Proceedings.
DOI: 10.1109/csac.2003.1254342
|View full text |Cite
|
Sign up to set email alerts
|

An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
51
0

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 62 publications
(51 citation statements)
references
References 9 publications
0
51
0
Order By: Relevance
“…For instance, an over-stimulation attack occurs when an attacker knows the signatures of a NIDS and forces it to generate a huge amount of alarms [26]. In such situation, the security officer analyzing the alerts would be overwhelmed and an actual attack may not be detected.…”
Section: Attacks On Nidsmentioning
confidence: 99%
“…For instance, an over-stimulation attack occurs when an attacker knows the signatures of a NIDS and forces it to generate a huge amount of alarms [26]. In such situation, the security officer analyzing the alerts would be overwhelmed and an actual attack may not be detected.…”
Section: Attacks On Nidsmentioning
confidence: 99%
“…Darren et al [14] introduced the general testing approach called Mucus which analyzes the data captured from the system. The authors used cross testing experiments with both an open-source and commercial tool.…”
Section: Related Workmentioning
confidence: 99%
“…By false positive we mean all network activities that are licit or harmless to the protected systems, but that have been erroneously signaled by the NIDS as a security threat. We should also consider that several techniques can be utilized by skilled attackers to cover up the attack traces by forcing a NIDS to generate storms of irrelevant alerts [2,3]. If the NIDS is working properly, the real attack is likely identified and signaled, but important alerts are hidden among several thousands of other irrelevant and misleading alerts.…”
Section: Intrusion Alert Filtering and Rankingmentioning
confidence: 99%