Plug & execute framework for network traffic generation

Uta Ziegler, Youssif B. Al-Nashif, Salim Hariri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Evaluating IDS algorithms and systems is often an ad-hoc process and makes it hard to compare evaluation results and performance of IDS systems. There is a need for divers and realistic test traffic and for developing metrics to be able to judge whether some generated traffic is a representative sample of observed traffic. In this paper, the authors propose a framework for a network traffic generator which creates diverse traffic through a variety of traffic sources and describe a working implementation of it. The lessons learned from this experience can serve as the basis to create a detailed specification for an open-source implementation of the framework.

Original languageEnglish (US)
Title of host publication6th Annual Cyber Security and Information Intelligence Research Workshop
Subtitle of host publicationCyber Security and Information Intelligence Challenges and Strategies, CSIIRW10
DOIs
StatePublished - 2010
Event6th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW10 - Oak Ridge, TN, United States
Duration: Apr 21 2010Apr 23 2010

Publication series

NameACM International Conference Proceeding Series

Other

Other6th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW10
Country/TerritoryUnited States
CityOak Ridge, TN
Period4/21/104/23/10

Keywords

  • network traffic generation
  • open-source
  • self-configuration

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Plug & execute framework for network traffic generation'. Together they form a unique fingerprint.

Cite this