2016
DOI: 10.3390/fi8030029
|View full text |Cite
|
Sign up to set email alerts
|

Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks

Abstract: Abstract:The Windows Operating System (OS) is the most popular desktop OS in the world, as it has the majority market share of both servers and personal computing necessities. However, as its default signature-based security measures are ineffectual for detecting zero-day and stealth attacks, it needs an intelligent Host-based Intrusion Detection System (HIDS). Unfortunately, a comprehensive data set that reflects the modern Windows OS's normal and attack surfaces is not publicly available. To fill this gap, i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
40
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(40 citation statements)
references
References 17 publications
0
40
0
Order By: Relevance
“…Larger Cross-evaluation. We emphasize that comparing UNI-CORN with other existing IDS (most of which are syscallbased) is difficult for several reasons: A) many IDS are not open-source; B) existing public IDS datasets are either outdated [4], [85] or require a translation [28], [50], [51] from, e.g., syscall traces to data provenance, which is challenging and sometimes impossible (due to lack of information); C) systems that create their own private datasets only superficially describe their experimental procedures, making it difficult to fairly reproduce the experiments for provenance data. We believe that such a meta-study is a worthwhile endeavor that we plan to pursue in future work.…”
Section: Discussion and Limitationsmentioning
confidence: 99%
“…Larger Cross-evaluation. We emphasize that comparing UNI-CORN with other existing IDS (most of which are syscallbased) is difficult for several reasons: A) many IDS are not open-source; B) existing public IDS datasets are either outdated [4], [85] or require a translation [28], [50], [51] from, e.g., syscall traces to data provenance, which is challenging and sometimes impossible (due to lack of information); C) systems that create their own private datasets only superficially describe their experimental procedures, making it difficult to fairly reproduce the experiments for provenance data. We believe that such a meta-study is a worthwhile endeavor that we plan to pursue in future work.…”
Section: Discussion and Limitationsmentioning
confidence: 99%
“…The peak of cyber-attack traffic launched by a huge number of Mirai-infected IoT devices reached 620 Gbps [2]. There were 10,263 botnets hosted in different IoT devices identified in 2018 [3]. Another distributed denial of services (DDoS) attack from compromised IoT devices, called "IoTroop," was discovered by Check Point in 2017 [4].…”
Section: Intrusion Detection System (Ids)mentioning
confidence: 99%
“…How to implement a lightweight and efficient detection system in the IoT environment has become a crucially important issue. The IDS on fog computing [24] was introduced using new modern datasets, namely Australian Defence Force Academy Linux Dataset (ADFA-LD) and ADFA-Windows Dataset (ADFA-WD) [3,25]. This work [24] also used Raspberry Pi to evaluate the performance of attack detecting model.…”
Section: Raspberry Pi-based Idsmentioning
confidence: 99%
“…However, ADFA family datasets only have minimal data required for intrusion detection, as they contain only system call identification-system dynamic link library (dll) file name and the called function name. Even the authors of the ADFA-IDS agree that the dataset is incomplete: only basic information was collected, and an insufficient number of vulnerabilities were used to generate malicious activity [13].…”
Section: Introductionmentioning
confidence: 99%