Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012)

A Framework of Evaluation Methodologies for Network Anomaly Detectors

Authors
Xin Zhao, Yekui Qian, Changsheng Wang
Corresponding Author
Xin Zhao
Available Online May 2014.
DOI
10.2991/iccia.2012.175How to use a DOI?
Keywords
emulation, framework, anomaly detector, netflow, flow matrix
Abstract

Anomaly detection has been a field of intensive research over the last years. Along with that several works to evaluate anomaly detectors have been proposed. In this paper we argue four properties regarding ideal evaluation methodologies that cannot be answered by single current evaluation technique employed today. We therefore present an framework of an evaluation methodology that leverages traces from operational networks, simulation and emulation to satisfy the four properties.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012)
Series
Advances in Intelligent Systems Research
Publication Date
May 2014
ISBN
10.2991/iccia.2012.175
ISSN
1951-6851
DOI
10.2991/iccia.2012.175How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Xin Zhao
AU  - Yekui Qian
AU  - Changsheng Wang
PY  - 2014/05
DA  - 2014/05
TI  - A Framework of Evaluation Methodologies for Network Anomaly Detectors
BT  - Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012)
PB  - Atlantis Press
SP  - 729
EP  - 732
SN  - 1951-6851
UR  - https://doi.org/10.2991/iccia.2012.175
DO  - 10.2991/iccia.2012.175
ID  - Zhao2014/05
ER  -