Attack-test and verification systems, steps towards verifiable anomaly detection
dc.contributor.author | Fourné, Marcel | |
dc.contributor.author | Petersen, Dominique | |
dc.contributor.author | Pohlmann, Norbert | |
dc.contributor.editor | Horbach, Matthias | |
dc.date.accessioned | 2019-03-07T09:31:45Z | |
dc.date.available | 2019-03-07T09:31:45Z | |
dc.date.issued | 2013 | |
dc.description.abstract | Botnet, network malware and anomaly detection algorithms are hard to evaluate and compare against each other due to different data sets. In some cases overspecialization on known malware gives high detection rates due to unknown artifacts in the training data set. This may lead to new malware being unnoticed on a network, because the detection algorithm has not been optimized for this case. Our proposal is a new and work-in-progress approach to generate parametricized and randomized testing data sets on the fly. We plan to couple this with the an automatic verification system to assess the quality of detection algorithms without internal knowledge of their working. We hope to encourage discussion to enhance the draft of our idea and especially to go into more detail on our work in progress. | en |
dc.identifier.isbn | 978-3-88579-614-5 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/20650 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-220 | |
dc.title | Attack-test and verification systems, steps towards verifiable anomaly detection | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 2224 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 2213 | |
gi.conference.date | 16.-20. September 2013 | |
gi.conference.location | Koblenz | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1