Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3422337.3450326acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
poster

Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort

Published: 26 April 2021 Publication History

Abstract

Research on network intrusion detection (NID) requires a large amount of traffic data with reliable labels indicating which packets are associated with particular network attacks. In this paper, we implement a prototype of an automated system to create labeled packet datasets for NID research. In this paper, we implement a prototype of an automated system to assign labels to packet datasets for NID research. By re-transmitting pre-captured packet data in a controlled network environment pre-installed with a network intrusion detection system, the system automatically assigns labels to attack packets within the packet data. In the feasibility study, we investigate factors that may influence the detection accuracy of the attacking packets and show an example using the prototype to label a packet file. Finally, we show an efficient way to locate the packets associated with issued NID alerts using this prototype.

Supplementary Material

MP4 File (CODASPY21-codas10p.mp4)
Research on network intrusion detection (NID) requires a large amount of traffic data with reliable labels indicating which packets are associated with particular network attacks. In this paper, we implement a prototype of an automated system to create labeled packet datasets for NID research. By re-transmitting pre-captured packet data in a controlled network environment pre-installed with a network intrusion detection system, the system automatically assigns labels to attack packets within the packet data. In the feasibility study, we investigate factors that may influence the detection accuracy of the attacking packets and show an example using the prototype to label a packet file. Finally, we show an efficient way to locate the packets associated with issued NID alerts using this prototype.

References

[1]
Fred Klassen. 2020. GitHub - appneta/tcpreplay: Pcap editing and replay tools for *NIX and Windows. https://github.com/appneta/tcpreplay (visited on 01/01/2021).
[2]
Martin Roesch. 1999. Snort: lightweight intrusion detection for networks. In Proceedings of the 13th Conference on Systems Administration (LISA-99), Seattle, WA, USA, November 7--12, 1999. USENIX, 229--238.
[3]
Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, and Ali A. Ghorbani. 2012. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers & Security, Vol. 31, 3 (May 2012), 357--374. https://doi.org/10.1016/j.cose.2011.12.012

Cited By

View all
  • (2023)Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT MalwareIEICE Transactions on Information and Systems10.1587/transinf.2022ICI0001E106.D:9(1302-1315)Online publication date: 1-Sep-2023
  • (2023)Improving Reliability for Cloud-Native 5G and Beyond Using Network Coding2023 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)10.1109/NFV-SDN59219.2023.10329609(1-7)Online publication date: 7-Nov-2023
  • (2023)A Recurrent Self-learning Labeler for Building Network Traffic Ground Truth2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD)10.1109/CSCWD57460.2023.10152778(1196-1201)Online publication date: 24-May-2023
  • Show More Cited By

Index Terms

  1. Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CODASPY '21: Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy
    April 2021
    348 pages
    ISBN:9781450381437
    DOI:10.1145/3422337
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 April 2021

    Check for updates

    Author Tags

    1. data labeling
    2. network intrusion detection
    3. snort
    4. tcpreplay

    Qualifiers

    • Poster

    Conference

    CODASPY '21
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 149 of 789 submissions, 19%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)30
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 21 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT MalwareIEICE Transactions on Information and Systems10.1587/transinf.2022ICI0001E106.D:9(1302-1315)Online publication date: 1-Sep-2023
    • (2023)Improving Reliability for Cloud-Native 5G and Beyond Using Network Coding2023 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)10.1109/NFV-SDN59219.2023.10329609(1-7)Online publication date: 7-Nov-2023
    • (2023)A Recurrent Self-learning Labeler for Building Network Traffic Ground Truth2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD)10.1109/CSCWD57460.2023.10152778(1196-1201)Online publication date: 24-May-2023
    • (2023)Consolidating Packet-Level Features for Effective Network Intrusion Detection: A Novel Session-Level ApproachIEEE Access10.1109/ACCESS.2023.333560011(132792-132810)Online publication date: 2023
    • (2023)Network Security System in Mobile Edge Computing-to-IoMT Networks Using Distributed ApproachSecurity and Risk Analysis for Intelligent Edge Computing10.1007/978-3-031-28150-1_9(171-191)Online publication date: 27-Feb-2023
    • (2022)Accurate Real-Time Labeling of Application Traffic2022 IEEE 47th Conference on Local Computer Networks (LCN)10.1109/LCN53696.2022.9843419(291-294)Online publication date: 26-Sep-2022
    • (2022)Generating Labeled Training Datasets Towards Unified Network Intrusion Detection SystemsIEEE Access10.1109/ACCESS.2022.317609810(53972-53986)Online publication date: 2022
    • (2021)Cloud-Based User Behavior Emulation Approach for Space-Ground Integrated NetworksSensors10.3390/s2201004422:1(44)Online publication date: 22-Dec-2021

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media