• DocumentCode
    1799962
  • Title

    Semi-synthetic data set generation for security software evaluation

  • Author

    Skopik, Florian ; Settanni, Giuseppe ; Fiedler, Roman ; Friedberg, Ivo

  • Author_Institution
    Safety & Security Dept., AIT Austrian Inst. of Technol., Vienna, Austria
  • fYear
    2014
  • fDate
    23-24 July 2014
  • Firstpage
    156
  • Lastpage
    163
  • Abstract
    Threats to modern ICT systems are rapidly changing these days. Organizations are not mainly concerned about virus infestation, but increasingly need to deal with targeted attacks. This kind of attacks are specifically designed to stay below the radar of standard ICT security systems. As a consequence, vendors have begun to ship self-learning intrusion detection systems with sophisticated heuristic detection engines. While these approaches are promising to relax the serious security situation, one of the main challenges is the proper evaluation of such systems under realistic conditions during development and before roll-out. Especially the wide variety of configuration settings makes it hard to find the optimal setup for a specific infrastructure. However, extensive testing in a live environment is not only cumbersome but usually also impacts daily business. In this paper, we therefore introduce an approach of an evaluation setup that consists of virtual components, which imitate real systems and human user interactions as close as possible to produce system events, network flows and logging data of complex ICT service environments. This data is a key prerequisite for the evaluation of modern intrusion detection and prevention systems. With these generated data sets, a system´s detection performance can be accurately rated and tuned for very specific settings.
  • Keywords
    data handling; security of data; ICT security systems; ICT systems; heuristic detection engines; information and communication technology systems; intrusion detection and prevention systems; security software evaluation; self-learning intrusion detection systems; semisynthetic data set generation; virus infestation; Complexity theory; Data models; Databases; Intrusion detection; Testing; Virtual machining; anomaly detection evaluation; scalable system behavior model; synthetic data set generation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on
  • Conference_Location
    Toronto, ON
  • Print_ISBN
    978-1-4799-3502-4
  • Type

    conf

  • DOI
    10.1109/PST.2014.6890935
  • Filename
    6890935