000 03039nam  2200373zi 4500
0019.892652
003CaOODSP
00520221107173230
006m     o  d f      
007cr mn|||||||||
008201021s2007    onca    ob   f000 0 eng d
040 |aCaOODSP|beng|erda|cCaOODSP
0410 |aeng|beng|bfre
0861 |aCo24-3/8-2007-3E-PDF
1001 |aMassicotte, Frederic, |eauthor.
24510|aIntrusion detection system (IDS) testing with a packet stimulator system / |cFrederic Massicotte.
264 1|aOttawa, ON Canada : |bCommunication Research Centre Canada = Centre des recherches sur les communications Canada, |c2007.
300 |a1 online resource (iii, 14 pages) : |billustrations.
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
4901 |aCRC technical note ; |vCRC-TN-2007-003
500 |a"Ottawa, March 2007."
500 |aDigitized edition from print [produced by Innovation, Science and Economic Development Canada].
504 |aIncludes bibliographical references (pages 13-14).
5203 |a"The relevant commercial product and research literature shows that many techniques may be used to test Intrusion Detection Systems (IDS) that protect computer networks. There are two main techniques for testing IDS detection accuracy: the vulnerability exploitation program approach and the IDS stimulator approach. In the vulnerability exploitation program approach, real attacks are used against real target systems to generate test cases. The currently available solutions are not scalable and they are limited. For instance, the number of vulnerability exploitation programs used in test data sets is often small and the variety of the targeted systems is limited. To overcome this problem an IDS stimulator can be used to generate test cases based on the IDS signature database and to launch the packets corresponding to those signatures against different IDS for testing. However, most current IDS stimulators were developed for attacking IDS and not for IDS testing and evaluation. In this report, we will investigate how an IDS stimulator could generate test cases to identify problems in the IDS configuration or engine and to identify new IDS evasion techniques. To prove this approach, we developed a new enhanced IDS stimulator that we used against Snort and we identified configuration problems and potential evasion techniques when used against intrusion detection systems"--Abstract, page i.
530 |aIssued also in print format.
546 |aIncludes abstracts in English and French.
650 0|aIntrusion detection systems (Computer security)
650 6|aSystèmes de détection d'intrusion (Sécurité informatique)
7102 |aCommunications Research Centre (Canada), |eissuing body.
830#0|aCRC technical note ;|vno. 2007-003.|w(CaOODSP)9.882494
85640|qPDF|s992 KB|uhttps://publications.gc.ca/collections/collection_2020/isde-ised/Co24/Co24-3-8-2007-3-eng.pdf