Sciweavers

CN
2000

The 1999 DARPA off-line intrusion detection evaluation

13 years 11 months ago
The 1999 DARPA off-line intrusion detection evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government site containing hundreds of users on thousands of hosts. More than 200 instances of 58 attack types were launched against victim UNIX and Windows NT hosts in three weeks of training data and two weeks of test data. False alarm rates were low (less than 10 per day). Best detection was provided by network-based systems for old probe and old denialof-service (DoS) attacks and by host-based systems for Solaris user-to-root (U2R) attacks. Best overall performance would have been provided by a combined system that used both host- and network-based intrusion detection. Detection accuracy was poor for previously unseen new, stealthy, and Windows NT attacks. Ten of the 58 attack types were completely missed by all systems. Systems missed attacks because protocols and TCP services were not analyzed at all or to the de...
Richard Lippmann, Joshua W. Haines, David J. Fried
Added 17 Dec 2010
Updated 17 Dec 2010
Type Journal
Year 2000
Where CN
Authors Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das
Comments (0)