IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v8y2016i3p29-d73345.html
   My bibliography  Save this article

Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks

Author

Listed:
  • Waqas Haider

    (School of Engineering and Information Technology, Australian Defence Force Academy, University of New South Wales, Canberra 2052, Australia)

  • Gideon Creech

    (School of Engineering and Information Technology, Australian Defence Force Academy, University of New South Wales, Canberra 2052, Australia)

  • Yi Xie

    (School of Data and Computer Science, Sun Yat-Sen University, Guangzhou 510006, China)

  • Jiankun Hu

    (School of Engineering and Information Technology, Australian Defence Force Academy, University of New South Wales, Canberra 2052, Australia)

Abstract

The Windows Operating System (OS) is the most popular desktop OS in the world, as it has the majority market share of both servers and personal computing necessities. However, as its default signature-based security measures are ineffectual for detecting zero-day and stealth attacks, it needs an intelligent Host-based Intrusion Detection System (HIDS). Unfortunately, a comprehensive data set that reflects the modern Windows OS’s normal and attack surfaces is not publicly available. To fill this gap, in this paper two open data sets generated by the cyber security department of the Australian Defence Force Academy (ADFA) are introduced, namely: Australian Defence Force Academy Windows Data Set (ADFA-WD); and Australian Defence Force Academy Windows Data Set with a Stealth Attacks Addendum (ADFA-WD: SAA). Statistical analysis results based on these data sets show that, due to the low foot prints of modern attacks and high similarity of normal and attacked data, both these data sets are complex, and highly intelligent Host based Anomaly Detection Systems (HADS) design will be required.

Suggested Citation

  • Waqas Haider & Gideon Creech & Yi Xie & Jiankun Hu, 2016. "Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks," Future Internet, MDPI, vol. 8(3), pages 1-8, July.
  • Handle: RePEc:gam:jftint:v:8:y:2016:i:3:p:29-:d:73345
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/8/3/29/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/8/3/29/
    Download Restriction: no
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Pooja Chaudhary & Brij Gupta & A. K. Singh, 2022. "Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 81(1), pages 23-39, September.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:8:y:2016:i:3:p:29-:d:73345. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.