skip to main content
10.1145/974044.974078acmconferencesArticle/Chapter ViewAbstractPublication PagesicpeConference Proceedingsconference-collections
Article

Generating realistic workloads for network intrusion detection systems

Published: 01 January 2004 Publication History

Abstract

While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to determine how to generate realistic workloads for nIDS performance evaluation. We develop a workload model that appears to provide reasonably accurate estimates compared to real workloads. The model attempts to emulate a traffic mix of different applications, reflecting characteristics of each application and the way these interact with the system. We have implemented this model as part of a traffic generator that can be extended and tuned to reflect the needs of different scenarios. We also present an approach to measuring the capacity of a nIDS that does not require the setup of a full network testbed.

References

[1]
Nlanr/dast: Iperf - the tcp/udp bandwidth measurement tool. http://dast.nlanr.net/Projects/Iperf/.
[2]
K. G. Anagnostakis, E. P. Markatos, S. Antonatos, and M. Polychronakis.: A domain-specific string matching algorithm for intrusion detection. In Proceedings of the 18th IFIP International Information Security Conference (SEC2003), May 2003.
[3]
S. Antonatos, K. G. Anagnostakis, M. Polychronakis, and E. P. Markatos. Performance analysis of content matching intrusion detection systems. In Proceedings of the 4th IEEE/IPSJ Symposium on Applications and the Internet (SAINT 2004), January 2004.
[4]
N. Athanasiades, R. Abler, J. Levine, H. Owen, and G. Riley. Intrusion detection testing and benchmarking methodologies. In Proceedings of the IEEE Information Assurance Workshop, pages 63--72, March 2003.
[5]
R. Boyer and J. Moore. A fast string searching algorithm. Commun. ACM, 20(10):762--772, October 1977.
[6]
C. J. Coit, S. Staniford, and J. McAlerney. Towards faster pattern matching for intrusion detection, or exceeding the speed of snort. In Proceedings of the 2nd DARPA Information Survivability Conference and Exposition (DISCEX II), June 2002.
[7]
C. Courcoubetis and V. A. Siris. Measurement and analysis of real network traffic. In Proceedings of the 7th Hellenic Conference on Informatics (HCI'99), August 1999.
[8]
M. Fisk and G. Varghese. An analysis of fast string matching applied to content-based forwarding and intrusion detection. Technical Report CS2001-0670 (updated version), University of California - San Diego, 2002.
[9]
M. Hall and K. Wiley. Capacity verification for high speed network intrusion detection systems. In Proceedings of Recent Advances in Intrusion Detection (RAID), 2002.
[10]
R. Horspool. Practical fast searching in strings. Software - Practice and Experience, 10(6):501--506, 1980.
[11]
Lawrence Berkeley National Laboratory. The internet traffic archive, http://ita.ee.lbl.gov/.
[12]
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das. The 1999 DARPA off-line intrusion detection evaluation. Computer Networks, 34(4):579--595, October 2000.
[13]
C. Liu, S. V. Wiel, and J. Yang. A nonstationary traffic train model for fine scale inference from coarse scale counts. IEEE Journal on Selected Areas in Communications: Internet and WWW Measurement, Mapping and Modeling, 21:895--907, August 2003.
[14]
E. P. Markatos, S. Antonatos, M. Polychronakis, and K. G. Anagnostakis. ExB: Exclusion-based signature matching for intrusion detection. In Proceedings of CCN'02, November 2002.
[15]
S. McCanne, C. Leres, and V. Jacobson. libpcap. Lawrence Berkeley Laboratory, Berkeley, CA, available via anonymous ftp to ftp.ee.lbl.gov.
[16]
J. McHugh. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory. ACM Transactions on Information and System Security, 4(3):262--294, November 2000.
[17]
P. Mell, V. Hu, and R. Lippmann. An overview of issues in testing intrusion detection systems. http://csrc, nist.gov/publications/nistir/nistir-7007.pdf
[18]
A. Moore, J. Hall, C. Kreibich, E. Harris, and I. Pratt. Architecture of a network monitor. In Proceedings of the Passive and Active Measurement Workshop (PAM), 2003.
[19]
P. Mueller and G. Shipley. Dragon claws its way to the top. Network Computing, pages 45--67, July 2001.
[20]
M. Muuss and T. Slattery. http://ftp.arl.mil/ftp/pub/ttcp.
[21]
NLANR Measurement and Operations Analysis Team. NLANR network traffic packet header traces. http://pma.nlanr.net/Traces/.
[22]
D. Robert, C. Terrence, W. Brian, M. Eric, and S. Luigi. Testing and evaluating computer intrusion detection systems. Communications of the ACM, 42(7):53--61, September 1999.
[23]
L. Schaelicke, T. Slabach, B. Moore, and C. Freeland. Characterizing the performance of network intrusion detection sensors. In Proceedings of Recent Advances in Intrusion Detection (RAID 2003), September 2003.
[24]
R. Sommer and V. Paxson. Enhancing byte-level network intrusion detection signatures with context. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), October 2003.
[25]
Sourcefire. Snort 2.0 - Detection Revisited. http://www.snort.org/docs/Snort_20_v4.pdf, October 2002.
[26]
S. I. stress tool. http://www.eurocompton.net/stick.
[27]
The NSS Group. Intrusion detection systems group test, December 2001. http://www.nss.co.uk/ids.
[28]
The Shmoo Group. Capture the flag contest (defcon). Available at http://www.shmoo.com/cctff.
[29]
S. tool. http://www.stolenshoes.net/sniph/index.html.
[30]
D. Veitch, J.-A. Backar, J. Wall, J. Yates, and M. Roughan. On-line generation of fractal and multifractal traffic. In Proceedings of the Workshop on Passive and Active Measurement (PAM 2000), pages 117--126, April 2000.
[31]
S. Wu and U. Manber. A fast algorithm for multi-pattern searching. Technical Report TR-94-17, University of Arizona, 1994.

Cited By

View all
  1. Generating realistic workloads for network intrusion detection systems

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WOSP '04: Proceedings of the 4th international workshop on Software and performance
    January 2004
    313 pages
    ISBN:1581136730
    DOI:10.1145/974044
    • cover image ACM SIGSOFT Software Engineering Notes
      ACM SIGSOFT Software Engineering Notes  Volume 29, Issue 1
      January 2004
      300 pages
      ISSN:0163-5948
      DOI:10.1145/974043
      Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 January 2004

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. intrusion detection
    2. security
    3. workload characterization and generation

    Qualifiers

    • Article

    Conference

    WOSP04
    WOSP04: Fourth International Workshop on Software and Performance 2004
    January 14 - 16, 2004
    California, Redwood Shores

    Acceptance Rates

    WOSP '04 Paper Acceptance Rate 38 of 70 submissions, 54%;
    Overall Acceptance Rate 149 of 241 submissions, 62%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)17
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 28 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media