A Framework for intrusion detection systems evaluation

dc.contributor.advisorFernando, S
dc.contributor.authorBandara, LRJ
dc.date.accept2007-10
dc.date.accessioned2011-03-31T06:08:56Z
dc.date.available2011-03-31T06:08:56Z
dc.descriptionA Dissertation submitted to the Department of Computer Science and Engineering for the MSc in Computer Scienceen_US
dc.description.abstractInformation security plays a major role in today's IT enabled organizations. In this security stance, Intrusion Detection Systems (IDSes) is a very important element if not the most. Therefore it is very important to select the most suitable product to deploy in any organization concerned. In order to select the suitable IDS it is necessary to evaluate at least short listed number of products or it is necessary to rely on some third party organizations who evaluate these products. But only very few organizations are involving in evaluating IDSes and therefore the cost of hiring such an organization is very high and hence only a very few organizations can bear it where as small organizations have to depend of there own methods. Therefore it is essential for the research community to help in evaluating these products. But the research community can not rely on the methods used by the organizations that do the evaluations since those methods are proprietary and not publicly available. This paper describes a method of using the existing freely available tools of generating a data set or a criterion check list and a framework that can be used to evaluate intrusion detection systems for a specific facility using the proposed method of generating data set./ Finally we discuss the lessons learned using this kind of a framework to evaluate intrusion detection systems and the opportunities for further improvement of this framework and in this area. The tool uses a check list or attack script list and a parser that passes parameters to an open source/free vulnerability scan engine according to the check list to attack the targets and then search the intrusion detection systems logs/database for any detection of those attacks. This will evaluate the quality of the signatures of the specific intrusion detection system. Then we use Snort IDS as the base line to benchmark other candidate Ides (and possibly will try to benchmark at least one more IDS, as a proof-of-concept, due to the time limitation).
dc.format.extentvii, 40p. : ill.en_US
dc.identifier.accno92294en_US
dc.identifier.degreeMScen_US
dc.identifier.departmentDepartment of Computer Science and Engineeringen_US
dc.identifier.facultyEngineeringen_US
dc.identifier.urihttp://dl.lib.mrt.ac.lk/handle/123/732
dc.language.isoenen_US
dc.subjectCOMPUTER SCIENCE - Dissertation
dc.subjectCOMPUTER SCIENCE AND ENGINEERING - Dissertation
dc.subjectCOMPUTER SECUManagement RITY
dc.subjectCOMPUTER SECURITY - Intrusion Detection Systems
dc.titleA Framework for intrusion detection systems evaluation
dc.typeThesis-Abstract

Files

Original bundle

Now showing 1 - 3 of 3
Loading...
Thumbnail Image
Name:
92294-1.pdf
Size:
228.94 KB
Format:
Adobe Portable Document Format
Description:
Pre-text
Loading...
Thumbnail Image
Name:
92294-2.pdf
Size:
189.66 KB
Format:
Adobe Portable Document Format
Description:
Post-text
No Thumbnail Available
Name:
92294.pdf
Size:
8.82 MB
Format:
Adobe Portable Document Format
Description:
Full-thesis