Title :
Experimental Research on DFA-Based MLML IDS Security Evaluation
Author :
Wang, Hongbin ; Fang, Zhiyi ; Fong, Simon ; Si, Yain-Whar ; Liu, Liyang
Author_Institution :
Coll. of Comput. Sci. & Technol., Jilin Univ., Jilin, China
Abstract :
Many manufacturers and researchers have established various Intrusion Detection System (IDS) evaluation standards, most of which involve tests of IDS functions but neglect evaluation of IDS security. On the basis of IDS security evaluation, this paper describes segmented and multi-level mixed evaluation methods, classifies intrusions by type of TCP/IP, and illustrates the evaluation process by means of the Deterministic Finite Automaton (DFA) in fragmentation, making the test process more straightforward and vivid. Credibility levels are assigned to measures which are taken to make products meet basic functional requirements, thus dividing the evaluation process into three levels.
Keywords :
deterministic automata; finite automata; security of data; transport protocols; MLML IDS security evaluation; TCP/IP type; deterministic finite automaton; intrusion detection system; multilevel multilayer security evaluation; security credibility level; transport control protocol-Internet protocol; Computer crime; Data models; Doped fiber amplifiers; IP networks; Intrusion detection; Protocols; DFA; IDS; Multi-layer evaluation; Multi-level evaluation; security;
Conference_Titel :
Information Technology: New Generations (ITNG), 2011 Eighth International Conference on
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-61284-427-5
Electronic_ISBN :
978-0-7695-4367-3
DOI :
10.1109/ITNG.2011.72