TY - GEN
T1 - Plug & execute framework for network traffic generation
AU - Ziegler, Uta
AU - Al-Nashif, Youssif B.
AU - Hariri, Salim
PY - 2010
Y1 - 2010
N2 - Evaluating IDS algorithms and systems is often an ad-hoc process and makes it hard to compare evaluation results and performance of IDS systems. There is a need for divers and realistic test traffic and for developing metrics to be able to judge whether some generated traffic is a representative sample of observed traffic. In this paper, the authors propose a framework for a network traffic generator which creates diverse traffic through a variety of traffic sources and describe a working implementation of it. The lessons learned from this experience can serve as the basis to create a detailed specification for an open-source implementation of the framework.
AB - Evaluating IDS algorithms and systems is often an ad-hoc process and makes it hard to compare evaluation results and performance of IDS systems. There is a need for divers and realistic test traffic and for developing metrics to be able to judge whether some generated traffic is a representative sample of observed traffic. In this paper, the authors propose a framework for a network traffic generator which creates diverse traffic through a variety of traffic sources and describe a working implementation of it. The lessons learned from this experience can serve as the basis to create a detailed specification for an open-source implementation of the framework.
KW - network traffic generation
KW - open-source
KW - self-configuration
UR - http://www.scopus.com/inward/record.url?scp=78349279999&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78349279999&partnerID=8YFLogxK
U2 - 10.1145/1852666.1852720
DO - 10.1145/1852666.1852720
M3 - Conference contribution
SN - 9781450300179
T3 - ACM International Conference Proceeding Series
BT - 6th Annual Cyber Security and Information Intelligence Research Workshop
T2 - 6th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW10
Y2 - 21 April 2010 through 23 April 2010
ER -