Maintainable Log Datasets for Evaluation of Intrusion Detection Systems

03/16/2022
by   Max Landauer, et al.
0

Intrusion detection systems (IDS) monitor system logs and network traffic to recognize malicious activities in computer networks. Evaluating and comparing IDSs with respect to their detection accuracies is thereby essential for their selection in specific use-cases. Despite a great need, hardly any labeled intrusion detection datasets are publicly available. As a consequence, evaluations are often carried out on datasets from real infrastructures, where analysts cannot control system parameters or generate a reliable ground truth, or private datasets that prevent reproducibility of results. As a solution, we present a collection of maintainable log datasets collected in a testbed representing a small enterprise. Thereby, we employ extensive state machines to simulate normal user behavior and inject a multi-step attack. For scalable testbed deployment, we use concepts from model-driven engineering that enable automatic generation and labeling of an arbitrary number of datasets that comprise repetitions of attack executions with variations of parameters. In total, we provide 8 datasets containing 20 distinct types of log files, of which we label 8 files for 10 unique attack steps. We publish the labeled log datasets and code for testbed setup and simulation online as open-source to enable others to reproduce and extend our results.

READ FULL TEXT
research
09/15/2020

Data-Driven Network Intrusion Detection: A Taxonomy of Challenges and Methods

Data-driven methods have been widely used in network intrusion detection...
research
11/15/2021

Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments

Artifacts such as log data and network traffic are fundamental for cyber...
research
08/24/2023

Introducing a New Alert Data Set for Multi-Step Attack Analysis

Intrusion detection systems (IDS) reinforce cyber defense by autonomousl...
research
11/12/2020

Traffic Generation using Containerization for Machine Learning

The design and evaluation of data-driven network intrusion detection met...
research
01/29/2020

Intrusion Detection using ASTDs

In this paper, we show the application of ASTDs to intrusion detection. ...
research
11/27/2018

A Real-Time Remote IDS Testbed for Connected Vehicles

Connected vehicles are becoming commonplace. A constant connection betwe...
research
03/09/2022

The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

Enhancing Network Intrusion Detection Systems (NIDS) with supervised Mac...

Please sign up or login with your details

Forgot password? Click here to reset