Methodology of. Network Simulation in the Context of an Evaluation: Application to an IDS

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper presents. methodology for the evaluation of network services security and the security of protection products. This type of evaluation is an important activity, considering the ever-increasing number of security incidents in networks. Those evaluations can present different challenges with. variety of properties to verify and an even larger number of tools available to compose and orchestrate together. The chosen approach in the paper is to simulate scenarios to perform traffic generation containing both benign and malicious actions against services and security products, that can be used separately or conjointly in attack simulations. We use our recently proposed method to generate evaluation data. This methodology highlights the preparation efforts from the evaluator to choose an appropriate data generating function and make topology choices. The paper presents the case and discusses the experimental results of an evaluation of. network-based IDS, with only benign traffic, only malicious traffic, and mixed traffic.

Original languageEnglish
Title of host publicationICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy
EditorsPaolo Mori, Steven Furnell, Olivier Camp
PublisherScience and Technology Publications, Lda
Pages378-388
Number of pages11
ISBN (Print)9789897583599
DOIs
Publication statusPublished - 1 Jan 2019
Event5th International Conference on Information Systems Security and Privacy , ICISSP 2019 - Prague, Czech Republic
Duration: 23 Feb 201925 Feb 2019

Publication series

NameInternational Conference on Information Systems Security and Privacy
ISSN (Electronic)2184-4356

Conference

Conference5th International Conference on Information Systems Security and Privacy , ICISSP 2019
Country/TerritoryCzech Republic
CityPrague
Period23/02/1925/02/19

Keywords

  • Cybersecurity
  • Evaluation Methodology
  • Network Simulation

Fingerprint

Dive into the research topics of 'Methodology of. Network Simulation in the Context of an Evaluation: Application to an IDS'. Together they form a unique fingerprint.

Cite this