Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort

15Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Research on network intrusion detection (NID) requires a large amount of traffic data with reliable labels indicating which packets are associated with particular network attacks. In this paper, we implement a prototype of an automated system to create labeled packet datasets for NID research. In this paper, we implement a prototype of an automated system to assign labels to packet datasets for NID research. By re-transmitting pre-captured packet data in a controlled network environment pre-installed with a network intrusion detection system, the system automatically assigns labels to attack packets within the packet data. In the feasibility study, we investigate factors that may influence the detection accuracy of the attacking packets and show an example using the prototype to label a packet file. Finally, we show an efficient way to locate the packets associated with issued NID alerts using this prototype.

Cite

CITATION STYLE

APA

Masumi, K., Han, C., Ban, T., & Takahashi, T. (2021). Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort. In CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy (pp. 329–331). Association for Computing Machinery, Inc. https://doi.org/10.1145/3422337.3450326

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free