Key points are not available for this paper at this time.
An intrusion detection evaluation test bed was developed which generated normal traffic similar to that on a government site containing 100's of users on 1000's of hosts. More than 300 instances of 38 different automated attacks were launched against victim UNIX hosts in seven weeks of training data and two weeks of test data. Six research groups participated in a blind evaluation and results were analyzed for probe, denial-of-service (DoS) remote-to-local (R2L), and user to root (U2R) attacks. The best systems detected old attacks included in the training data, at moderate detection rates ranging from 63% to 93% at a false alarm rate of 10 false alarms per day. Detection rates were much worse for new and novel R2L and DoS attacks included only in the test data. The best systems failed to detect roughly half these new attacks which included damaging access to root-level privileges by remote users. These results suggest that further research should focus on developing techniques to find new attacks instead of extending existing rule-based approaches.
Building similarity graph...
Analyzing shared references across papers
Loading...
Richard P. Lippmann
David J. Fried
Isaac Graf
Massachusetts Institute of Technology
MIT Lincoln Laboratory
Building similarity graph...
Analyzing shared references across papers
Loading...
Lippmann et al. (Thu,) studied this question.
www.synapsesocial.com/papers/6a07fa75217278811afe10ec — DOI: https://doi.org/10.1109/discex.2000.821506
Synapse has enriched 5 closely related papers on similar clinical questions. Consider them for comparative context: