Logo des Repositoriums
 

Attack-test and verification systems, steps towards verifiable anomaly detection

dc.contributor.authorFourné, Marcel
dc.contributor.authorPetersen, Dominique
dc.contributor.authorPohlmann, Norbert
dc.contributor.editorHorbach, Matthias
dc.date.accessioned2019-03-07T09:31:45Z
dc.date.available2019-03-07T09:31:45Z
dc.date.issued2013
dc.description.abstractBotnet, network malware and anomaly detection algorithms are hard to evaluate and compare against each other due to different data sets. In some cases overspecialization on known malware gives high detection rates due to unknown artifacts in the training data set. This may lead to new malware being unnoticed on a network, because the detection algorithm has not been optimized for this case. Our proposal is a new and work-in-progress approach to generate parametricized and randomized testing data sets on the fly. We plan to couple this with the an automatic verification system to assess the quality of detection algorithms without internal knowledge of their working. We hope to encourage discussion to enhance the draft of our idea and especially to go into more detail on our work in progress.en
dc.identifier.isbn978-3-88579-614-5
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/20650
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofINFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-220
dc.titleAttack-test and verification systems, steps towards verifiable anomaly detectionen
dc.typeText/Conference Paper
gi.citation.endPage2224
gi.citation.publisherPlaceBonn
gi.citation.startPage2213
gi.conference.date16.-20. September 2013
gi.conference.locationKoblenz
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
2213.pdf
Größe:
309.9 KB
Format:
Adobe Portable Document Format