The 1999 DARPA off-line intrusion detection evaluation

被引:467
作者
Lippmann, R [1 ]
Haines, JW [1 ]
Fried, DJ [1 ]
Korba, J [1 ]
Das, K [1 ]
机构
[1] MIT, Lincoln Lab, Lexington, MA 02420 USA
来源
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING | 2000年 / 34卷 / 04期
关键词
intrusion detection; evaluate; attack; audit; test bed;
D O I
10.1016/S1389-1286(00)00139-0
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Eight sites participated in the second Defense Advanced Research Projects Agency (DARPA) off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government site containing hundreds of users on thousands of hosts. More than 200 instances of 58 attack types were launched against victim UNIX and Windows NT hosts in three weeks of training data and two weeks of test data. False-alarm rates were low (less than 10 per day). The best detection was provided by network-based systems for old probe and old denial-of-service (DoS) attacks and by host-based systems for Solaris user-to-root (U2R) attacks. The best overall performance would have been provided by a combined system that used both host- and network-based intrusion detection. Detection accuracy was Door for previously unseen, new, stealthy and Windows NT attacks. Ten of the 58 attack types were completely missed by all systems. Systems missed attacks because signatures for old attacks did not generalize to new attacks, auditing was not available on all hosts, and protocols and TCP services were not analyzed at all or to the depth required. Promising capabilities were demonstrated by host-based systems, anomaly detection systems and a system that performs forensic analysis on file system data. (C) 2000 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:579 / 595
页数:17
相关论文
共 24 条
  • [1] Allen J, 2000, CMUSEI99TR028
  • [2] AMOROSO EG, 1999, INTRUSION DETECTION
  • [3] DAS K, 2000, THESIS MIT
  • [4] DEBAR H, 1999, 2998 RZ IBM RES DIV
  • [5] Testing and evaluating computer intrusion detection systems
    Durst, R
    Champion, T
    Witten, B
    Miller, E
    Spagnuolo, L
    [J]. COMMUNICATIONS OF THE ACM, 1999, 42 (07) : 53 - 61
  • [6] ELKAN C, 1999, INT C KNOWL DISC DAT
  • [7] GHOSH AK, 1999, P USENIX SEC S 23 26
  • [8] JAJODIA S, 2000, AUDIT DATA ANAL MINI
  • [9] KENDALL K, 1999, THESIS MIT
  • [10] KORBA J, 2000, THESIS MIT