DARPA Intrusion Detection Evaluation Data Set

DARPA 1999年評測數據包括覆蓋了Probe,DoS,R2L,U2R和Data等5大類58種典型攻擊方式,是目前最爲全面的攻擊測試數據集.同時,作爲研 究領域共同認可及廣泛使用的基準評測數據集,DARPA 1999年評測數據爲新提出的入侵檢測算法和技術與其他算法之間的比較提供了可能.DARPA 1999評測數據給出了5周的模擬數據,其中前兩週是提供給參於評測者的訓練數據:第1,3周爲不包含任何攻擊的正常數據;第2週中插入了屬於18種類型 的43次攻擊實例.後2周的數據則用於評測;第4周、第5週中包含了屬於58種類型的201次攻擊實例,其中40種攻擊類型並沒有在前兩週的訓練數據中出現,屬於新的攻擊類型.
18個研究中的IDS系統參與了1999年的評測,優勝者爲SRI International提交的EMERALD系統,在其檢測範圍內的169個攻擊實例中檢測出85個,檢測率爲50%.此外,58種攻擊類型中有21 種類型共計77個攻擊實例被劃分爲Poor Detected,參與測評的系統最多也僅能檢測其中的15個攻擊實例.

1999 DARPA Intrusion Detection Evaluation Data Set Overview

There were two parts to the 1999 DARPA Intrusion Detection Evaluation: an off-line evaluation and a realtime evaluation.

Intrusion detection systems were tested in the off-line evaluation using network traffic and audit logs collected on a simulation network. The systems processed this data in batch mode and attempted to identify attack sessions in the midst of normal activities.

Intrusion detection systems were delivered to AFRL for the realtime evaluation. These systems were inserted into the AFRL network testbed and attempted to identify attack sessions in the midst of normal activities, in realtime.

Intrusion detection systems were tested as part of the off-line evaluation, the realtime evaluation or both.


Training Data

Three weeks of training data were provided for the 1999 DARPA Intrusion Detection off-line evaluation.

The first and third weeks of the training data do not contain any attacks. This data was provided to facilitate the training of anomaly detection systems.

The second week of the training data contains a select subset of attacks from the 1998 evaluation in addition to several new attacks. The primary purpose in presenting these attacks was to provide examples of how to report attacks that are detected.

Note: In 1999, Intrusion detection systems were trained using the data from both the 1998 and the 1999 evaluations.

The following files are provided for each day in the training set:

  • Outside sniffing data ( Tcpdump format )
  • Inside sniffing data ( Tcpdump format )
  • BSM audit data ( From pascal )
  • NT audit data ( From hume )
  • Long listings of directory trees ( From pascal, marx, zeno, and hume )
  • Dumps of selected directories ( From pascal, marx, zeno, and hume )
  • A Report of file system inode information ( From pascal )
BSM Configuration [tar/gzip]
First Week of Training Data (Attack Free)
Second Week of Training Data (Contains Labled Attacks)
Third Week of Training Data (Attack Free)


Testing Data

Two weeks of network based attacks in the midst of normal background data. The forth and fifth weeks of data are the "Test Data" used in the 1999 Evaluation from 9/16/1999 to 10/1/1999. There are 201 instances of about 56 types of attacks distributed throughout these two weeks.

Further information about the attack instances, where they are located in week 4 and 5 data is found in the "1999 Attack Truth" available on the Documentation page.

Fourth Week of Test Data
Fifth Week of Test Data
 
1998 DARPA Intrusion Detection Evaluation Data Set Overview

There were two parts to the 1998 DARPA Intrusion Detection Evaluation: an off-line evaluation and a realtime evaluation.

Intrusion detection systems were tested in the off-line evaluation using network traffic and audit logs collected on a simulation network. The systems processed this data in batch mode and attempted to identify attack sessions in the midst of normal activities.

Intrusion detection systems were delivered to AFRL for the realtime evaluation. These systems were inserted into the AFRL network testbed and attempted to identify attack sessions in the midst of normal activities, in realtime.

Intrusion detection systems were tested as part of the off-line evaluation, the realtime evaluation or both.


Sample Data

A sample of the network traffic and audit logs that were used for evaluating systems. These data were first made available in February 1998.


Four-Hour Subset of Training Data

A somewhat larger sample of training data. These data were first made available in May 1998.


Training Data

Seven weeks of network based attacks in the midst of normal background data. Listings of attacks and anomalies are available on the Documentation page.


Testing Data

Two weeks of network based attacks in the midst of normal background data.

http://www.ll.mit.edu/IST/ideval/data/2000/2000_data_index.html

2000 DARPA Intrusion Detection Scenario Specific Data Sets

The content and labeling of data sets relies significantly on reports and feedback from consumers of this data. Please send feedback on this data set to Joshua W. Haines so that your ideas can be incorporated into future data sets. Thanks!

Overview

Off-line intrusion detection datasets were produced as per consensus from the Wisconsin Re-Think meeting and the July 2000 Hawaii PI meeting.

LLDOS 1.0 - Scenario One

This is the first attack scenario data set to be created for DARPA as a part of this effort. It includes a distributed denial of service attack run by a novice attacker. Future versions of this and other example scenarios will contain more stealthy attack versions.

This attack scenario is carried out over multiple network and audit sessions. These sessions have been grouped into 5 attack phases, over the course of which the attacker probes the network, breaks in to a host by exploiting the Solaris sadmind vulnerability, installs trojan mstream DDoS software, and launches a DDoS attack at an off site server from the comprismised host.

  • ADVERSARY: Novice
  • ADVERSARY GOAL: Install components for and carry out a DDOS attack
  • DEFENDER: Naive

Data and labeling information is available for downloading .

LLDOS 2.0.2 - Scenario Two

This is the second attack scenario data set to be created for DARPA as a part of this effort. It includes a distributed denial of service attack run by an attacker who is more stealthy than the attacker in the first dataset. The attacker is still considered a Novice, as the attack is mostly scripted in a fashion that dispite being a bit more stealthy, is still something that any attacker might be able to download and run.

This attack scenario is carried out over multiple network and audit sessions. These sessions have been grouped into 5 attack phases, over the course of which the attacker probes the network, breaks in to a host by exploiting the Solaris sadmind vulnerability, installs trojan mstream DDoS software, and launches a DDoS attack at an off-site server from the comprismised host.

  • ADVERSARY: Novice
  • ADVERSARY GOAL: Install components for and carry out a DDOS attack
  • DEFENDER: Naive

Data and labeling information is available for downloading .

Windows NT Attack Data Set

An experiment with a level of NT auditing higher than that which was run in the 1999 Evaluation was run in January of 2000. Here are the collected traces of data from that run of one day's traffic and attack impinging on the NT machine. High level labeling information for these is available now.

Note: This day contains data from 08:00 to 14:30 hours. The network sniffers collected data until 17:00.

發佈了14 篇原創文章 · 獲贊 13 · 訪問量 18萬+
發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章