Visible to the public Semi-synthetic data set generation for security software evaluation

TitleSemi-synthetic data set generation for security software evaluation
Publication TypeConference Paper
Year of Publication2014
AuthorsSkopik, F., Settanni, G., Fiedler, R., Friedberg, I.
Conference NamePrivacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on
Date PublishedJuly
Keywordsanomaly detection evaluation, Complexity theory, data handling, Data models, Databases, heuristic detection engines, ICT security systems, ICT systems, information and communication technology systems, Intrusion detection, intrusion detection and prevention systems, scalable system behavior model, security of data, security software evaluation, self-learning intrusion detection systems, semisynthetic data set generation, synthetic data set generation, Testing, Virtual machining, virus infestation
Abstract

Threats to modern ICT systems are rapidly changing these days. Organizations are not mainly concerned about virus infestation, but increasingly need to deal with targeted attacks. This kind of attacks are specifically designed to stay below the radar of standard ICT security systems. As a consequence, vendors have begun to ship self-learning intrusion detection systems with sophisticated heuristic detection engines. While these approaches are promising to relax the serious security situation, one of the main challenges is the proper evaluation of such systems under realistic conditions during development and before roll-out. Especially the wide variety of configuration settings makes it hard to find the optimal setup for a specific infrastructure. However, extensive testing in a live environment is not only cumbersome but usually also impacts daily business. In this paper, we therefore introduce an approach of an evaluation setup that consists of virtual components, which imitate real systems and human user interactions as close as possible to produce system events, network flows and logging data of complex ICT service environments. This data is a key prerequisite for the evaluation of modern intrusion detection and prevention systems. With these generated data sets, a system's detection performance can be accurately rated and tuned for very specific settings.

URLhttps://ieeexplore.ieee.org/document/6890935/
DOI10.1109/PST.2014.6890935
Citation Key6890935