Abstract
Security systems need be tested on the network, when they are developed, for their security test and performance evaluation. Even though the security tests have to be done on the real network but, it is usually tested in a virtual test environment. APS (Attack Packet Simulator) is one of tools for performance test of security system on the virtual environment. In this paper, the development of an attack packet generator extracts the attack information from Snort rule and creates attack information in the Database using the extracted information applying intelligent APS. Also, the proposed generator generates high speed network attack packets to closely assimilate the real network for security system tests using an NP (Network Processor).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jeon, J., Soh, W.: Design and Implementation of An Attack Packet Simulator for Performance test of Information Security System. In: ICCMSE 2005 (2005)
Martin Roesch, Chris Green, SourceFire, INC.: Snort Users Manual, http://www.snort.org
Sniph, Snot (2001), http://www.sec33.com/sniph/
Mutz, D., Vigna, G., Kemmerer, R.: An Experience Developing an IDS Simulator for the Black-Box Testing of Network Intrusion Detection Systems (2003)
Puketza, N.J., Zhang, K., Chung, M., Mukherjee, B., Olsson, R.A.: A Methodology for Testing Intrusion Detection System. IEEE Transactions on Software Engineering 22(10), 719–729 (1996)
Debar, H., Dacier, M., Wespi, A., Lampart, S.: An Experimentation Workbench for Intrusion Detection Systems, IBM Zurich Lab, Research Report (1998)
Lippmann, R.P., Fried, D.J., Graf, I., Haines, J.W., Kend-all, K.R., McClung, D., Weber, D., Webster, S.E., Wyschogrod, D., Cun-ningham, R.K., Zissman, M.A.: Evaluation Intrusion Detection Systems: the 1998 DARPA Off-Line Intrusion Detection Evaluation. In: Proceedings of the 2000 DARPA In-formation Survivability Conference and Exposition (2000)
Durst, R., Champion, T., Written, B., Miller, E., Spagnuolo, L.: Testing and Evaluating Computer Intrusion Detection Systems. Communication of the ACM 42(7), 53–61 (1999)
CCRA(Arrangement on the Recognition of Common Criteria Certificates), http://www.commoncriteria.org
CC: Common Criteria for Information Technology Security Evaluation, Version 2.1, CCIMB-99-031 (1999)
An NSS Group Report V 1.0, Intrusion Prevention Systems(IPS), Group Test, NSS, (January 2004)
RadiSys Corporation, Linux Setup guide for ENP-XXXX, http://www.radisys.com
RadiSys Corporation, ENP-2506 Hardware Reference Manual, http://www.radisys.com
Intel Corporation, IXP1200 Hardware Reference Manual, http://www.intel.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, W., Soh, W. (2006). Development of an Attack Packet Generator Applying an NP to the Intelligent APS. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2006. Lecture Notes in Computer Science(), vol 4252. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11893004_91
Download citation
DOI: https://doi.org/10.1007/11893004_91
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-46537-9
Online ISBN: 978-3-540-46539-3
eBook Packages: Computer ScienceComputer Science (R0)