Towards a framework for the generation of enhanced attack and background network traffic for evaluation of network- based intrusion detection systems


There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat such threats, multiple lines of defence are applied to a network including firewalls, malicious software scanners and intrusion detection systems (IDS). IDSs are generally considered… (More)


11 Figures and Tables

Slides referencing similar topics