Skip to main content

Development of an Attack Packet Generator Applying an NP to the Intelligent APS

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4252))

  • 2291 Accesses

Abstract

Security systems need be tested on the network, when they are developed, for their security test and performance evaluation. Even though the security tests have to be done on the real network but, it is usually tested in a virtual test environment. APS (Attack Packet Simulator) is one of tools for performance test of security system on the virtual environment. In this paper, the development of an attack packet generator extracts the attack information from Snort rule and creates attack information in the Database using the extracted information applying intelligent APS. Also, the proposed generator generates high speed network attack packets to closely assimilate the real network for security system tests using an NP (Network Processor).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jeon, J., Soh, W.: Design and Implementation of An Attack Packet Simulator for Performance test of Information Security System. In: ICCMSE 2005 (2005)

    Google Scholar 

  2. Martin Roesch, Chris Green, SourceFire, INC.: Snort Users Manual, http://www.snort.org

  3. Sniph, Snot (2001), http://www.sec33.com/sniph/

  4. Mutz, D., Vigna, G., Kemmerer, R.: An Experience Developing an IDS Simulator for the Black-Box Testing of Network Intrusion Detection Systems (2003)

    Google Scholar 

  5. http://www.securitybugware.org/excalibur/

  6. Puketza, N.J., Zhang, K., Chung, M., Mukherjee, B., Olsson, R.A.: A Methodology for Testing Intrusion Detection System. IEEE Transactions on Software Engineering 22(10), 719–729 (1996)

    Article  Google Scholar 

  7. Debar, H., Dacier, M., Wespi, A., Lampart, S.: An Experimentation Workbench for Intrusion Detection Systems, IBM Zurich Lab, Research Report (1998)

    Google Scholar 

  8. Lippmann, R.P., Fried, D.J., Graf, I., Haines, J.W., Kend-all, K.R., McClung, D., Weber, D., Webster, S.E., Wyschogrod, D., Cun-ningham, R.K., Zissman, M.A.: Evaluation Intrusion Detection Systems: the 1998 DARPA Off-Line Intrusion Detection Evaluation. In: Proceedings of the 2000 DARPA In-formation Survivability Conference and Exposition (2000)

    Google Scholar 

  9. Durst, R., Champion, T., Written, B., Miller, E., Spagnuolo, L.: Testing and Evaluating Computer Intrusion Detection Systems. Communication of the ACM 42(7), 53–61 (1999)

    Article  Google Scholar 

  10. CCRA(Arrangement on the Recognition of Common Criteria Certificates), http://www.commoncriteria.org

  11. CC: Common Criteria for Information Technology Security Evaluation, Version 2.1, CCIMB-99-031 (1999)

    Google Scholar 

  12. An NSS Group Report V 1.0, Intrusion Prevention Systems(IPS), Group Test, NSS, (January 2004)

    Google Scholar 

  13. RadiSys Corporation, Linux Setup guide for ENP-XXXX, http://www.radisys.com

  14. RadiSys Corporation, ENP-2506 Hardware Reference Manual, http://www.radisys.com

  15. Intel Corporation, IXP1200 Hardware Reference Manual, http://www.intel.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, W., Soh, W. (2006). Development of an Attack Packet Generator Applying an NP to the Intelligent APS. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2006. Lecture Notes in Computer Science(), vol 4252. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11893004_91

Download citation

  • DOI: https://doi.org/10.1007/11893004_91

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46537-9

  • Online ISBN: 978-3-540-46539-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics