skip to main content
survey

Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices

Published:29 September 2015Publication History
Skip Abstract Section

Abstract

The evaluation of computer intrusion detection systems (which we refer to as intrusion detection systems) is an active research area. In this article, we survey and systematize common practices in the area of evaluation of such systems. For this purpose, we define a design space structured into three parts: workload, metrics, and measurement methodology. We then provide an overview of the common practices in evaluation of intrusion detection systems by surveying evaluation approaches and methods related to each part of the design space. Finally, we discuss open issues and challenges focusing on evaluation methodologies for novel intrusion detection systems.

Skip Supplemental Material Section

Supplemental Material

References

  1. Abdulbasit Ahmed, Alexei Lisitsa, and Clare Dixon. 2011. A misuse-based network intrusion detection system using temporal logic and stream processing. In Proceedings of the 5th International Conference on Network and System Security (NSS’11). 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  2. Miriam Allalouf, Muli Ben-Yehuda, Julian Satran, and Itai Segall. 2010. Block storage listener for detecting file-level intrusions. In Proceedings of the 26th Symposium on Mass Storage Systems and Technologies (MSST’10). 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Faeiz Alserhani, Monis Akhlaq, Irfan U. Awan, Andrea J. Cullen, and Pravin Mirchandani. 2010. MARS: Multi-stage attack recognition system. In Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications (AINA’10). IEEE, Los Alamitos, CA, 753--759. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Alberto Avritzer, Rajanikanth Tanikella, Kiran James, Robert G. Cole, and Elaine J. Weyuker. 2010. Monitoring for security intrusion using performance signatures. In Proceedings of the 1st Joint WOSP/SIPEW International Conference on Performance Engineering (WOSP/SIPEW’10). 93--104. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Stefan Axelsson. 2000. The base-rate fallacy and its implications for the difficulty of intrusion detection. ACM Transactions on Information and Systems Security 3, 3, 186--205. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Saketh Bharadwaja, Weiqing Sun, Mohammed Niamat, and Fangyang Shen. 2011. Collabra: A Xen hypervisor based collaborative intrusion detection system. In Proceedings of the 8th International Conference on Information Technology: New Generations (ITNG’11). IEEE, Los Alamitos, CA, 695--700. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Tsung-Huan Cheng, Ying-Dar Lin, Yuan-Cheng Lai, and Po-Ching Lin. 2012. Evasion techniques: Sneaking through your intrusion detection/prevention systems. IEEE Communications Surveys and Tutorials 14, 4, 1011--1020.Google ScholarGoogle ScholarCross RefCross Ref
  8. Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen-Yang Luo, and Hsiu-Chuan Huang. 2010. Semi-supervised learning for false alarm reduction. In Advances in Data Mining: Applications and Theoretical Aspects. Lecture Notes in Computer Science, Vol. 6171. Springer, Berlin, 595--605. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Chun-Jen Chung, Khatkar Pankaj, Tianyi Xing, Jeongkeun Lee, and Dijiang Huang. 2013. NICE: Network intrusion detection and countermeasure selection in virtual network systems. IEEE Transactions on Dependable and Secure Computing 10, 4, 198--211. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Simon P. Chung and Aloysius K. Mok. 2006. On random-inspection-based intrusion detection. In Proceedings of the 8th International Conference on Recent Advances in Intrusion Detection (RAID’06). 165--184. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Scott E. Coull, Charles V. Wright, Fabian Monrose, Michael P. Collins, and Michael K. Reiter. 2007. Playing devils advocate: Inferring sensitive information from anonymized network traces. In Proceedings of the Network and Distributed System Security Symposium. 35--47.Google ScholarGoogle Scholar
  12. Robert K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall, S. E. Webster, D. Wyschogrod, and M. A. Zissman. 1999. Evaluating intrusion detection systems without attacking your friends: The 1998 DARPA Intrusion Detection Evaluation. In Proceedings of the SANS 1999 Workshop on Securing Linux.Google ScholarGoogle Scholar
  13. Hervé Debar, Marc Dacier, and Andreas Wespi. 1999. Towards a taxonomy of intrusion-detection systems. Computer Networks 31, 9, 805--822. Google ScholarGoogle ScholarCross RefCross Ref
  14. Hervé Debar, Marc Dacier, Andreas Wespi, and Stefan Lampart. 1998. An Experimentation Workbench for Intrusion Detection Systems. Technical Report. IBM Research, Zurich Research Laboratory.Google ScholarGoogle Scholar
  15. Alex Dehnert. 2012. Intrusion detection using VProbes. VMware Technical Journal 1, 2, 28--31.Google ScholarGoogle Scholar
  16. Holger Dreger, Anja Feldmann, Vern Paxson, and Robin Sommer. 2008. Predicting the resource consumption of network intrusion detection systems. In Proceedings of the 2008 International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS’08). ACM, New York, NY, 437--438. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Tudor Dumitras and Darren Shou. 2011. Toward a standard benchmark for computer security research: The worldwide intelligence network environment (WINE). In Proceedings of the 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. ACM, New York, NY, 89--96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai, and Peter M. Chen. 2002. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI’02). ACM, New York, NY, 211--224. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Robert Durst, Terrence Champion, Brian Witten, Eric Miller, and Luigi Spagnuolo. 1999. Testing and evaluating computer intrusion detection systems. ACM Communications 42, 7, 53--61. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Y. Frank Jou, Fengmin Gong, Chandru Sargor, Xiaoyong Wu, Shyhtsun F. Wu, Heng-Chia Chang, and Feiyi Wang. 2000. Design and implementation of a scalable intrusion detection system for the protection of network infrastructure. In Proceedings of DARPA Information Survivability Conference and Exposition, Vol. 2. 69--83.Google ScholarGoogle Scholar
  21. Josè Fonseca, Marco Vieira, and Henrique Madeira. 2014. Evaluation of Web security mechanisms using vulnerability and attack injection. IEEE Transactions on Dependable and Secure Computing 11, 5, 440--453.Google ScholarGoogle ScholarCross RefCross Ref
  22. Romain Fontugne, Pierre Borgnat, Patrice Abry, and Kensuke Fukuda. 2010. MAWILab: Combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking. In Proceedings of the 6th International Conference on Emerging Networking Experiments and Technologies (CoNEXT’10). Article No. 8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. James C. Foster. 2007. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Syngress Publishing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Mohammed Gad El Rab. 2008. Evaluation des systèmes de détection d’intrusion. Ph.D. Dissertation. Université Paul Sabatier—Toulouse III.Google ScholarGoogle Scholar
  25. John E. Gaffney and Jacob W. Ulvila. 2001. Evaluation of intrusion detectors: A decision theory approach. In Proceedings of the 2001 IEEE Symposium on Security and Privacy. 50--61. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Tal Garfinkel and Mendel Rosenblum. 2003. A virtual machine introspection based architecture for intrusion detection. In Proceedings of the Network and Distributed Systems Security Symposium. 191--206.Google ScholarGoogle Scholar
  27. John Linwood Griffin, Adam Pennington, John S. Bucy, Deepa Choundappan, Nithya Muralidharan, and Gregory R. Ganger. 2003. On the Feasibility of Intrusion Detection Inside Workstation Disks. Research Paper. Carnegie-Mellon University, Pittsburgh, PA.Google ScholarGoogle Scholar
  28. Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, and Boris Skorić. 2006. Measuring intrusion detection capability: An information-theoretic approach. In Proceedings of the 2006 ACM Symposium on Information, Computer, and Communications Security (ASIACCS’06). ACM, New York, NY, 90--101. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Mike Hall and Kevin Wiley. 2002. Capacity verification for high speed network intrusion detection systems. In Proceedings of the 5th International Conference on Recent Advances in Intrusion Detection (RAID’02). Springer-Verlag, Berlin, 239--251. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Amin Hassanzadeh and Radu Stoleru. 2011. Towards optimal monitoring in cooperative IDS for resource constrained wireless networks. In Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN’11). 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  31. Hai Jin, Guofu Xiang, Feng Zhao, Deqing Zou, Min Li, and Lei Shi. 2009. VMFence: A customized intrusion prevention system in distributed virtual computing environment. In Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication (ICUIMC’09). ACM, New York, NY, 391--399. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Hai Jin, Guofu Xiang, Deqing Zou, Song Wu, Feng Zhao, Min Li, and Weide Zheng. 2011. A VMM-based intrusion prevention system in cloud computing environment. Journal of Supercomputing 66, 1133--1151. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Pradeep Kannadiga and Mohammad Zulkernine. 2005. DIDMA: A distributed intrusion detection system using mobile agents. In Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. 238--245. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Christopher Kruegel, Fredrik Valeur, and Giovanni Vigna. 2005. Intrusion Detection and Correlation: Challenges and Solutions. Advances in Information Security, Vol. 14. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Marcus Laureano, Carlos Maziero, and Edgard Jamhour. 2007. Protecting host-based intrusion detectors through virtual machines. Computer Networks 51, 5, 1275--1283. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Hoang Le and Viktor K. Prasanna. 2013. A memory-efficient and modular approach for large-scale string pattern matching. IEEE Transactions on Computers 62, 5, 844--857. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Po-Ching Lin and Jia-Hau Lee. 2013. Re-examining the performance bottleneck in a {NIDS} with detailed profiling. Journal of Network and Computer Applications 36, 2, 768--780. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, and Kumar Das. 2000. The 1999 DARPA off-line intrusion detection evaluation. Computer Networks 34, 4, 579--595. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Flavio Lombardi and Roberto Di Pietro. 2011. Secure virtualization for cloud computing. Journal of Network and Computer Applications 34, 4, 1113--1122. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. John McHugh. 2000. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security 3, 4, 262--294. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Peter Mell, Vincent Hu, Richard Lippmann, Josh Haines, and Marc Zissman. 2003. An Overview of Issues in Testing Intrusion Detection Systems. NIST Interagency/Internal Report. National Institute of Standards and Technology.Google ScholarGoogle Scholar
  42. Yuxin Meng. 2012. Measuring intelligent false alarm reduction using an ROC curve-based approach in network intrusion detection. In Proceedings of the IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA’12). 108--113.Google ScholarGoogle ScholarCross RefCross Ref
  43. Yuxin Meng and Wenjuan Li. 2012. Adaptive character frequency-based exclusive signature matching scheme in distributed intrusion detection environment. In Proceedings of the IEEE 11th International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom’12). 223--230. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Chirag Modi and Dhiren Patel. 2013. A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing. In Proceedings of the IEEE Symposium on Computational Intelligence in Cyber Security (CICS’13). 23--30.Google ScholarGoogle ScholarCross RefCross Ref
  45. Khalid Nasr, AnasAbou-El Kalam, and Christian Fraboul. 2012. Performance analysis of wireless intrusion detection systems. In Internet and Distributed Computing Systems. Springer, 238--252. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Swapnil Patil, Anand Kashyap, Gopalan Sivathanu, and Erez Zadok. 2004. FS: An in-kernel integrity checker and intrusion detection file system. In Proceedings of the 18th USENIX Conference on System Administration (LISA’04). 67--78. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Nicholas Puketza, Mandy Chung, Ronald A. Olsson, and Biswanath Mukherjee. 1997. A software platform for testing intrusion detection systems. IEEE Software 14, 5, 43--51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Nicholas J. Puketza, Kui Zhang, Mandy Chung, Biswanath Mukherjee, and Ronald A. Olsson. 1996. A methodology for testing intrusion detection systems. IEEE Transactions on Software Engineering 22, 10, 719--729. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Kannaiya N. Raja, Srinivasan Arulanandam, and Raja Rajeswari. 2012. Two-level packet inspection using sequential differentiate method. In Proceedings of the International Conference on Advances in Computing and Communications (ICACC’12). 42--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Marcus J. Ranum. 2001. Experiences Benchmarking Intrusion Detection Systems. White Paper. NFR Security Technical Publications.Google ScholarGoogle Scholar
  51. Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith. 2012. Intrusion detection for resource-constrained embedded control systems in the power grid. International Journal of Critical Infrastructure Protection 5, 2, 74--83.Google ScholarGoogle ScholarCross RefCross Ref
  52. Ryan Riley, Xuxian Jiang, and Dongyan Xu. 2008. Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing. In Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID’08). Springer-Verlag, Berlin, 1--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Martin Roesch. 1999. Snort—lightweight intrusion detection for networks. In Proceedings of the 13th USENIX Conference on System Administration (LISA’99). 229--238. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Karen Scarfone and Peter Mell. 2007. Guide to Intrusion Detection and Prevention Systems (IDPS). Report 900-94. NIST Special Publication.Google ScholarGoogle Scholar
  55. Vidar Evenrud Seeberg and Slobodan Petrovic. 2007. A new classification scheme for anonymization of real data used in IDS benchmarking. In Proceedings of the 2nd International Conference on Availability, Reliability, and Security (ARES’07). 385--390. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Jaydip Sen, Arijit Ukil, Debasis Bera, and Arpan Pal. 2008. A distributed intrusion detection system for wireless ad hoc networks. In Proceedings of the 16th IEEE International Conference on Networks (ICON’08). 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  57. Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, and Ali Ghorbani. 2012. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers and Security 31, 3, 357--374. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Sushant Sinha, Farnam Jahanian, and Jignesh M. Patel. 2006. WIND: Workload-aware INtrusion Detection. In Proceedings of the 9th International Conference on Recent Advances in Intrusion Detection (RAID’06). Springer-Verlag, Berlin, 290--310. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Robin Sommer and Vern Paxson. 2010. Outside the closed world: On using machine learning for network intrusion detection. In Proceedings of the 2010 IEEE Symposium on Security and Privacy (SP’10). 305--316. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Abhinav Srivastava, Kapil Singh, and Jonathon Giffin. 2008. Secure Observation of Kernel Behavior. Retrieved July 28, 2015, from http://hdl.handle.net/1853/25464.Google ScholarGoogle Scholar
  61. William Stallings. 2002. Cryptography and Network Security: Principles and Practice. Pearson Education. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Bo Sun, Xuemei Shan, Kui Wu, and Yang Xiao. 2013. Anomaly detection based secure in-network aggregation for wireless sensor networks. IEEE Systems Journal 7, 1, 13--25.Google ScholarGoogle ScholarCross RefCross Ref
  63. Chris Wright, Crispin Cowan, Stephen Smalley, James Morris, and Greg Kroah-Hartman. 2002. Linux security modules: General security support for the Linux kernel. In Proceedings of the 11th USENIX Security Symposium. 17--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Senhua Yu and Dipankar Dasgupta. 2011. An effective network-based intrusion detection using conserved self pattern recognition algorithm augmented with near-deterministic detector generation. In Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS’11). 17--24.Google ScholarGoogle ScholarCross RefCross Ref
  65. Yuxin Meng and Lam-For Kwok. 2013. Towards an information-theoretic approach for measuring intelligent false alarm reduction in intrusion detection. In Proceedings of the 12th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom’13). 241--248. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Youhui Zhang, Hongyi Wang, Yu Gu, and Dongsheng Wang. 2008. IDRS: Combining file-level intrusion detection with block-level data recovery based on iSCSI. In Proceedings of the 3rd International Conference on Availability, Reliability, and Security (ARES’08). 630--635. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image ACM Computing Surveys
                ACM Computing Surveys  Volume 48, Issue 1
                September 2015
                592 pages
                ISSN:0360-0300
                EISSN:1557-7341
                DOI:10.1145/2808687
                • Editor:
                • Sartaj Sahni
                Issue’s Table of Contents

                Copyright © 2015 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 29 September 2015
                • Accepted: 1 June 2015
                • Revised: 1 March 2015
                • Received: 1 October 2014
                Published in csur Volume 48, Issue 1

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • survey
                • Research
                • Refereed

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader