Research Report: Synthesizing Intrusion Detection System Test Data from Open-Source Attack Signatures.
Jared ChandlerAdam WickPublished in: SP Workshops (2023)
Keyphrases
- test data
- intrusion detection system
- open source
- attack detection
- intrusion detection
- attack scenarios
- alert correlation
- misuse detection
- denial of service attacks
- network intrusions
- network security
- network attacks
- normal behavior
- computer networks
- cyber attacks
- test cases
- network intrusion detection
- training data
- network intrusion
- distributed intrusion detection
- anomaly detection
- security measures
- network traffic
- normal traffic
- test set
- computer security
- source code
- computer systems
- dos attacks
- data sets
- training set
- data mining techniques
- cyber security
- data processing
- supervised learning
- security policies
- data mining