DocumentCode
1799962
Title
Semi-synthetic data set generation for security software evaluation
Author
Skopik, Florian ; Settanni, Giuseppe ; Fiedler, Roman ; Friedberg, Ivo
Author_Institution
Safety & Security Dept., AIT Austrian Inst. of Technol., Vienna, Austria
fYear
2014
fDate
23-24 July 2014
Firstpage
156
Lastpage
163
Abstract
Threats to modern ICT systems are rapidly changing these days. Organizations are not mainly concerned about virus infestation, but increasingly need to deal with targeted attacks. This kind of attacks are specifically designed to stay below the radar of standard ICT security systems. As a consequence, vendors have begun to ship self-learning intrusion detection systems with sophisticated heuristic detection engines. While these approaches are promising to relax the serious security situation, one of the main challenges is the proper evaluation of such systems under realistic conditions during development and before roll-out. Especially the wide variety of configuration settings makes it hard to find the optimal setup for a specific infrastructure. However, extensive testing in a live environment is not only cumbersome but usually also impacts daily business. In this paper, we therefore introduce an approach of an evaluation setup that consists of virtual components, which imitate real systems and human user interactions as close as possible to produce system events, network flows and logging data of complex ICT service environments. This data is a key prerequisite for the evaluation of modern intrusion detection and prevention systems. With these generated data sets, a system´s detection performance can be accurately rated and tuned for very specific settings.
Keywords
data handling; security of data; ICT security systems; ICT systems; heuristic detection engines; information and communication technology systems; intrusion detection and prevention systems; security software evaluation; self-learning intrusion detection systems; semisynthetic data set generation; virus infestation; Complexity theory; Data models; Databases; Intrusion detection; Testing; Virtual machining; anomaly detection evaluation; scalable system behavior model; synthetic data set generation;
fLanguage
English
Publisher
ieee
Conference_Titel
Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on
Conference_Location
Toronto, ON
Print_ISBN
978-1-4799-3502-4
Type
conf
DOI
10.1109/PST.2014.6890935
Filename
6890935
Link To Document