Many approaches have been proposed to tackle network security; among them, many exploit machine learning and pattern recognition techniques, by regarding malicious behavior detection as a classification problem. Supervised and unsupervised techniques are used, each with its own benefits and shortcomings. When using supervised techniques, a suitably representative training set is required, which reliably indicates what a human expert wants the system to]cam and recognize. To this aim, we present an approach based on the Dempster-Shafer theory, which exploits the Dempster-Shafer combination rule for automatically building a database of labeled network traffic from raw tcpdump packet captures. We also show that systems trained on such a database perform approximatively as well as the same systems trained on correctly labeled data.

Information fusion techniques for reliably training intrusion detection systems

Gargiulo Francesco;
2007

Abstract

Many approaches have been proposed to tackle network security; among them, many exploit machine learning and pattern recognition techniques, by regarding malicious behavior detection as a classification problem. Supervised and unsupervised techniques are used, each with its own benefits and shortcomings. When using supervised techniques, a suitably representative training set is required, which reliably indicates what a human expert wants the system to]cam and recognize. To this aim, we present an approach based on the Dempster-Shafer theory, which exploits the Dempster-Shafer combination rule for automatically building a database of labeled network traffic from raw tcpdump packet captures. We also show that systems trained on such a database perform approximatively as well as the same systems trained on correctly labeled data.
2007
978-1-84628-944-6
Computer Security
IDS
classification
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/319346
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact