IEEE Transactions on Software Engineering - Special issue on computer security and privacy
State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
A Methodology for Testing Intrusion Detection Systems
IEEE Transactions on Software Engineering
Security problems in the TCP/IP protocol suite
ACM SIGCOMM Computer Communication Review
Art of Software Testing
ACM Transactions on Information and System Security (TISSEC)
DEVS Simulation of distributed intrusion detection systems
Transactions of the Society for Computer Simulation International - Recent advances in DEVS Methodology--part I
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Modeling and Simulation for Detecting a Distributed Denial of Service Attack
AI '02 Proceedings of the 15th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Simulation of Network Security with Collaboration among IDS Models
AI '01 Proceedings of the 14th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Applying a data mining method for intrusion detection
CompSysTech '07 Proceedings of the 2007 international conference on Computer systems and technologies
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model
Information Security Applications
Evaluation of the diagnostic capabilities of commercial intrusion detection systems
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Attacks against computer network: formal grammar-based framework and simulation tool
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Comparing anomaly detection techniques for HTTP
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
Accuracy improving guidelines for network anomaly detection systems
Journal in Computer Virology
Proposals on assessment environments for anomaly-based network intrusion detection systems
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Redesign and implementation of evaluation dataset for intrusion detection system
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Performance analysis of wireless intrusion detection systems
IDCS'12 Proceedings of the 5th international conference on Internet and Distributed Computing Systems
Administrative evaluation of intrusion detection system
Proceedings of the 2nd annual conference on Research in information technology
Hi-index | 0.00 |
As the use of intrusion detection systems increases, so too does the need for tools and methodologies for testing and evaluating them. The authors have developed a software platform that simulates intrusions and tests the effectiveness of intrusion detection systems. Their platform lets you create scripts that simulate both typical and suspicious activity, and has a record-and-replay feature that helps you create scripts quickly and easily. The platform supports the authors' testing methodology, which they outline here; both the platform and the testing methodology can be used to test and compare several different intrusion detection systems.