关键词不能为空

当前您在: 主页 > 英语 >

Darpa介绍

作者:高考题库网
来源:https://www.bjmy2z.cn/gaokao
2021-02-16 00:47
tags:

-

2021年2月16日发(作者:era)


D


A


R


P


A



I


N

< br>T


R


U


S


I


O


N



D


E


T


E


C


T


I


O


N



E


V


A


L


U


A


T

< br>I


O


N



DARPA Intrusion Detection Evaluation


Intrusion detection systems monitor network state looking for unauthorized usage,


denial of service, and anomalous behavior.


Such systems have never been formally evaluated ... until now.


The


Cyber Security and Information Sciences


Group (formerly the Information Systems


Technology Group) of MIT Lincoln Laboratory, under Defense Advanced Research Projects


Agency


(


DARPA


ITO


)


and


Air


Force


Research


Laboratory


(AFRL/SNHS)


sponsorship,


has


collected


and


distributed


the


first


standard


corpora


for


evaluation


of


computer


network


intrusion


detection


systems.


We


have


also


coordinated,


with


the


Air


Force


Research


Laboratory, the first formal, repeatable, and statistically significant evaluations of intrusion


detection systems. Such evaluation efforts have been carried out in 1998 and 1999. These


evaluations measure probability of detection and probability of false alarm for each system


under test.


These evaluations are contributing significantly to the intrusion detection research field


by providing direction for research efforts and an objective calibration of the current technical


state of the art. They are of interest to all researchers working on the general problem of


workstation


and


network


intrusion


detection.


The


evaluation


is


designed


to


be


simple,


to


focus


on


core


technology


issues,


and


to


encourage


the


widest


possible


participation


by


eliminating security and privacy concerns and providing data types that are used commonly


by the majority of intrusion detection systems.


?



?



?



?




Data Sets


?



Documentation


?



Publications


?



Evaluation Results


?



美国国防部高级研究计划局入侵检测评估


入侵检测系统监视网络状态,发现未经授权使用、拒绝服务和反常的行为。



直到现在,这个系统从来没有正式评估


……




麻省理工学院的林肯实验室的网络安全与信息科学组织


(


原信息系统技术组织


),

< br>在国防


高级研究计划局


(DARPA


ITO)


和空军研究实验室


(AFRL


/


SNHS)


赞助之下


,


收集和分发计算


机网络入侵检测系统的第一次标准 评价。


我们也跟空军研究实验室协调了第一个正式的、



重复的


,


统计上显著的入侵检测系统评价。这 样的评价工作已经在


1998


年和


19 99


年实现。


在此测试下,这些评估能够测量检测率和误告警率 。



这些评估对入侵检测研究领域贡献显著,

< br>为研究工作提供了方向,


并且客观校准了当前


技术状态。


他们对所有致力于解决工作站和网络入侵检测存在的普遍问题的研究人员感兴趣。


评价是设计简单


,


专注于核心技术问题


,


并鼓励尽可能广泛的参与通过消除安全与隐私问题

< br>和提供数据类型通常使用的大多数入侵检测系统。








1999 DARPA Intrusion Detection Evaluation Data Set


1999 DARPA Intrusion Detection Evaluation Data Set Overview


There were two parts to the 1999 DARPA Intrusion Detection Evaluation: an off-line


evaluation and a realtime evaluation.


Intrusion detection systems were tested in the off-line evaluation using network traffic


and audit logs collected on a simulation network. The systems processed this data in batch


mode and attempted to identify attack sessions in the midst of normal activities.


Intrusion detection systems were delivered to AFRL for the realtime evaluation. These


systems


were


inserted


into


the


AFRL


network


testbed


and


attempted


to


identify


attack


sessions in the midst of normal activities, in realtime.


Intrusion detection systems were tested as part of the off- line evaluation, the realtime


evaluation or both.


Training Data


Three weeks of training data were provided for the 1999 DARPA Intrusion Detection


off-line evaluation.


The first and third weeks of the training data


do not


contain any attacks. This data was


provided to facilitate the training of anomaly detection systems.


The second week of the training data contains a select subset of attacks from the 1998


evaluation in addition to several new attacks. The primary purpose in presenting these


attacks was to provide examples of how to report attacks that are detected.


Note:


In 1999, Intrusion detection systems were trained using the data from both the 1998


and the 1999 evaluations.


The following files are provided for each day in the training set:


?



?



?



?



?



?



?



Outside sniffing data ( Tcpdump format )


Inside sniffing data ( Tcpdump format )


BSM audit data ( From pascal )


NT audit data ( From hume )


Long listings of directory trees ( From pascal, marx, zeno, and hume )


Dumps of selected directories ( From pascal, marx, zeno, and hume )


A Report of file system inode information ( From pascal )


BSM Configuration


[tar/gzip]


First Week


of Training Data (Attack Free)


Second Week


of Training Data (Contains Labled Attacks)


Third Week


of Training Data (Attack Free)


Testing Data


Two weeks of network based attacks in the midst of normal background data. The forth


and fifth weeks of data are the


10/1/1999.


There


are


201


instances


of


about


56


types


of


attacks


distributed


throughout


these two weeks.


Further information about the attack instances, where they are located in week 4 and


5 data is found in the


Documentation


page.


Fourth Week


of Test Data


Fifth Week


of Test Data


1999 Training Data - Week 1


The simulation network normally collected data twenty-two hours a day. The tcpslice


program was used to examine the outside tcpdump data files and the actual times of the first


and


last


packet


were


extracted.


These


times


are


shown


below.


During


the


first


week


of


training data the simulation network did not experience any unscheduled down time.



First Packet Time



Mon


Mar 1


08:00:02


Tue


Mar 2


08:00:02



Last Packet Time



Mar 2


06:00:02







Tue



Wed


Mar 3


06:00:01



Thu


Mar 4


06:00:01



Fri



Sat


Mar 5


06:00:02


Mar 6


06:00:02










Wed


Mar 3


08:00:03


Thu


Mar 4


08:00:03


Fri



Mar 5


08:00:02














Monday


outside tcpdump data


inside tcpdump data


159,432 kb gzipped


165,264 kb gzipped


Solaris BSM audit data


NT audit data


5,559 kb gzipped


4,501 kb tarred &gzipped


Selected directory dumps


3,118 kb tarred &gzipped


File system listing & inode record



6,851 kb tarred &gzipped


Tuesday


outside tcpdump data


inside tcpdump data


155,620 kb gzipped


163,009 kb gzipped


Solaris BSM audit data


NT audit data


2,869 kb gzipped


82,712 kb tarred &gzipped


Selected directory dumps


2,482 kb tarred &gzipped


File system listing & inode record



6,347 kb tarred &gzipped


Wednesday


outside tcpdump data


inside tcpdump data


180,585 kb gzipped


186,631 kb gzipped


Solaris BSM audit data


NT audit data


2,238 kb gzipped


306 kb tarred &gzipped


Selected directory dumps


3,057 kb tarred &gzipped


File system listing & inode record



6,358 kb tarred &gzipped


Thursday


outside tcpdump data


inside tcpdump data


Solaris BSM audit data


NT audit data


Selected directory dumps


File system listing & inode record



Friday


outside tcpdump data


inside tcpdump data


Solaris BSM audit data


NT audit data


Selected directory dumps


File system listing & inode record



Errata.


None.


























244,683 kb gzipped


267,904 kb gzipped


2,789 kb gzipped


2,012 kb tarred &gzipped


3,116 kb tarred &gzipped


6,288 kb tarred &gzipped


141,562 kb gzipped


150,301 kb gzipped


2,074 kb gzipped


10,546 kb tarred &gzipped


3,117 kb tarred &gzipped


2,732 kb tarred &gzipped


1999 Training Data - Week 2


The simulation network normally collected data twenty-two hours a day. The tcpslice


program was used to examine the outside tcpdump data files and the actual times of the first


and last packet were extracted. These times are shown below. During the second week of


training data the simulation network was brought down early ( 3:00 AM ) during Tuesday's


run for extended unscheduled maintenance.



First Packet Time




Last Packet Time



Mon


Mar 8


08:00:01



Tue


Tue


Mar 9


08:00:01



Wed


Wed


Mar 10


08:00:03



Thu


Thu


Mar 11


08:00:03



Fri


Fri


Mar 12


08:00:02



Sat



Monday


outside tcpdump data


inside tcpdump data


Solaris BSM audit data


NT audit data


Selected directory dumps


File system listing & inode record



Tuesday


outside tcpdump data


inside tcpdump data


Solaris BSM audit data


NT audit data


Selected directory dumps


File system listing & inode record



Wednesday


outside tcpdump data


inside tcpdump data


Solaris BSM audit data


NT audit data


Selected directory dumps


File system listing & inode record



Mar 9


06:00:49



Mar 10


02:59:59



Mar 11


06:00:01



Mar 12


06:00:00



Mar 13


06:00:00



167,536 kb gzipped


185,368 kb gzipped


2,789 kb gzipped


10,482 kb tarred &gzipped


3,269 kb tarred &gzipped


10,597 kb tarred &gzipped


196,205 kb gzipped


206,995 kb gzipped


3,086 kb gzipped


10,481 kb tarred &gzipped


2,966 kb tarred &gzipped


6,991 kb tarred &gzipped


68,267 kb gzipped


78,986 kb gzipped


3,182 kb gzipped


10,481 kb tarred &gzipped


3,416 kb tarred &gzipped


6,993 kb tarred &gzipped


Thursday


outside tcpdump data


inside tcpdump data


165,445 kb gzipped


172,389 kb gzipped


Solaris BSM audit data


NT audit data


5,884 kb gzipped


2,497 kb tarred &gzipped


Selected directory dumps


3,315 kb tarred &gzipped


File system listing & inode record



6,563 kb tarred &gzipped


Friday


outside tcpdump data


inside tcpdump data


142,087 kb gzipped


151,229 kb gzipped


Solaris BSM audit data


NT audit data


3,875 kb gzipped


440 kb tarred &gzipped


Selected directory dumps


3,442 kb tarred &gzipped


File system listing & inode record



6,944 kb tarred &gzipped


Errata.


None.


1999 DARPA Intrusion Detection Evaluation


The official guidelines for the 1999 DARPA evaluation. Numerous things were changed


from the 1998 evaluation.


?



?



?



?



?



?



Evaluation


Schedule



Off Line 1999 Evaluation Plan



Labeled Attacks from 2nd Week of Training Data



Off-line Simulation Network [


GIF


] [


PPT


]


List


of Simulation Network Hosts (Names and IP addresses)


Other documents about the 1999 evaluation are available.


A Summary of the 1998 Evaluation with a Brief Outline of Changes for the 1999


Evaluation is available in


PDF Format


.


A


table of stealthy U2R attack instances


, showing how each attack instance was made


to be stealthy with respect to the network sniffer based Intrusion Detection systems.


An


attack database


is now available online. This attack taxonomy is based on the


1998 - 1999 training data and incorporates attack descriptions from Kris Kendall's thesis. The


database includes attacks considered


The Master's Thesis of Kris Kendall contains descriptions of all the attacks used in the


1998 evaluation and a useful taxonomy of attacks. The thesis is available on the publications


page.


Detection Scoring Truth


- List of all attack instances in the 1999 test data.


Identification Scoring Truth


- Identification alert entries for all attack instances in the


1999 test data.


1999 Analysis of Windows NT Attacks


In early 2000 work was done to further analyze the detect-ability of all attacks run


against the Windows NT host in the 1999 Windows NT event log auditing test data. We have


compiled a table of all such attacks and the detection results in 1999 and provided a perl


script that automatically locates the specific implementations of these attacks used in 1999.


?



?



?



T


able


of NT attack instances and detection results in 1999.


A


Perl script


for locating the 1999 NT attacks in the audit logs.


List


of hosts and operating systems used in this scenario.


2000 Dataset One


Future Evaluations and Datasets


Plans for future Intrusion Detection Evaluations have been discussed. A significant effort


is being made to step-back and ensure that evaluations of intrusion detection technology are


appropriately


designed


and


scaled


to


respond


to


the


needs


of


DARPA


and


the


research


community. Early stages of planning were carried out in the Spring of 2000. Those helping


with


this


early


planning


included


DARPA,


Principle


Investigators


in


the


DARPA


Strategic


Information


Assurance


(SIA)


program,


the


Sandia


Red-Team,


and


Lincoln


Laboratory.


A


planning workshop, entitled the


Wisconsin. Slides from the Wisconsin meeting are available on a Schafer website.


The outcome of this meeting was that in the current year, Lincoln Laboratory was


tasked to produce much needed off-line intrusion detection datasets. These datasets will


provide researchers with extensive examples of attacks and background traffic. The Hawaii PI


meeting presentation given at the SIA PI meeting gives the goals of and a detailed plan for


producing the 2000 datasets.





















-


-


-


-


-


-


-


-



本文更新与2021-02-16 00:47,由作者提供,不代表本网站立场,转载请注明出处:https://www.bjmy2z.cn/gaokao/656851.html

Darpa介绍的相关文章

  • 爱心与尊严的高中作文题库

    1.关于爱心和尊严的作文八百字 我们不必怀疑富翁的捐助,毕竟普施爱心,善莫大焉,它是一 种美;我们也不必指责苛求受捐者的冷漠的拒绝,因为人总是有尊 严的,这也是一种美。

    小学作文
  • 爱心与尊严高中作文题库

    1.关于爱心和尊严的作文八百字 我们不必怀疑富翁的捐助,毕竟普施爱心,善莫大焉,它是一 种美;我们也不必指责苛求受捐者的冷漠的拒绝,因为人总是有尊 严的,这也是一种美。

    小学作文
  • 爱心与尊重的作文题库

    1.作文关爱与尊重议论文 如果说没有爱就没有教育的话,那么离开了尊重同样也谈不上教育。 因为每一位孩子都渴望得到他人的尊重,尤其是教师的尊重。可是在现实生活中,不时会有

    小学作文
  • 爱心责任100字作文题库

    1.有关爱心,坚持,责任的作文题库各三个 一则150字左右 (要事例) “胜不骄,败不馁”这句话我常听外婆说起。 这句名言的意思是说胜利了抄不骄傲,失败了不气馁。我真正体会到它

    小学作文
  • 爱心责任心的作文题库

    1.有关爱心,坚持,责任的作文题库各三个 一则150字左右 (要事例) “胜不骄,败不馁”这句话我常听外婆说起。 这句名言的意思是说胜利了抄不骄傲,失败了不气馁。我真正体会到它

    小学作文
  • 爱心责任作文题库

    1.有关爱心,坚持,责任的作文题库各三个 一则150字左右 (要事例) “胜不骄,败不馁”这句话我常听外婆说起。 这句名言的意思是说胜利了抄不骄傲,失败了不气馁。我真正体会到它

    小学作文