{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:17:25Z","timestamp":1730279845584,"version":"3.28.0"},"reference-count":49,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/iwias.2003.1192459","type":"proceedings-article","created":{"date-parts":[[2004,1,24]],"date-time":"2004-01-24T04:33:03Z","timestamp":1074918783000},"page":"63-72","source":"Crossref","is-referenced-by-count":19,"title":["Intrusion detection testing and benchmarking methodologies"],"prefix":"10.1109","author":[{"given":"N.","family":"Athanasiades","sequence":"first","affiliation":[]},{"given":"R.","family":"Abler","sequence":"additional","affiliation":[]},{"given":"J.","family":"Levine","sequence":"additional","affiliation":[]},{"given":"H.","family":"Owen","sequence":"additional","affiliation":[]},{"given":"G.","family":"Riley","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2002","key":"ref39"},{"year":"2002","key":"ref38"},{"year":"2002","key":"ref33"},{"year":"2002","key":"ref32"},{"year":"2002","key":"ref31"},{"article-title":"Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection","year":"2002","author":"ptacek","key":"ref30"},{"year":"2002","key":"ref37"},{"year":"2002","key":"ref36"},{"year":"2002","key":"ref35"},{"year":"2002","key":"ref34"},{"key":"ref28","article-title":"The inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments","author":"loscocco","year":"0","journal-title":"National Security Agency"},{"year":"2002","key":"ref27"},{"year":"2002","key":"ref29"},{"article-title":"A Methodology for Testing Intrusion Detection Systems","year":"1993","author":"zhnag","key":"ref2"},{"key":"ref1","article-title":"Benchmarking a distributed intrusion detection system based on ASAX: Preliminary results","author":"abily","year":"2000","journal-title":"Extended abstract presented at RAID"},{"key":"ref20","first-page":"1","article-title":"Testing Intrusion Detection Systems: Design Methodologies and Results from an Early Prototype","volume":"1","author":"puketza","year":"1994","journal-title":"Proc 17th Natrional Computer Security Conference"},{"article-title":"Experiences Benchmarking Intrusion detection Systems","year":"2002","author":"ranum","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/32.544350"},{"year":"2002","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2002.1036158"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932190"},{"year":"2002","key":"ref25"},{"article-title":"Results of the DARPA 1998 Offline Intrusion Detection Evaluation","year":"0","author":"lippmann","key":"ref10"},{"key":"ref11","first-page":"12","article-title":"Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation","author":"lippmann","year":"2000","journal-title":"Proceeding of the DARPA Information Survivability Conference and Exposition DISCEX-200 Volume 2 Los Alamitos California IEE Computer Society"},{"year":"2002","key":"ref40"},{"key":"ref12","article-title":"The 1998 DARPAIAFRL Off-Line Intrusion Detection Evaluation","author":"lippmann","year":"1998","journal-title":"First International Workshop on Recent Advances in Intrusion Detection (RAID)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSN.2000.857599"},{"key":"ref14","article-title":"Measuring Intrusion Detection Systems","author":"maxion","year":"0","journal-title":"Web Proceedings of the First International Workshop on Recent Advances in Intrusion Detection (RAID'98)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"ref16","article-title":"Intrusion Detection: A Bibliography","author":"me","year":"2001","journal-title":"Technical Report SSIR-2001–01"},{"article-title":"Acquiring and Deploying Intrusion detection Systems","year":"0","author":"mell","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/52.605930"},{"key":"ref19","article-title":"A methodology for Testing Intrusion Detection Systems","author":"puketza","year":"1994","journal-title":"17th Natrional Computer Security Conference"},{"article-title":"Air Force Intrusion Detection System Evaluation","year":"0","author":"champion","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2001.931291"},{"article-title":"A Database of Computer Attacks for the Evaluations of Intrusion Detection Systems","year":"1999","author":"kendall","key":"ref6"},{"key":"ref5","article-title":"Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation","author":"cunningham","year":"0","journal-title":"Proceedings of the Third Conference and Workshop on Intrusion Detection and Response (SANS 1999)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"article-title":"Windows NT Attacks for the Evaluation of Intrusion Detection Systems","year":"2000","author":"korba","key":"ref7"},{"year":"2002","key":"ref49"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"article-title":"Attack Development for Intrusion Detection Evaluation","year":"2000","author":"das","key":"ref46"},{"year":"2002","key":"ref45"},{"article-title":"THOR: A Tool to Test Intrusion Detection Systems by Variation of Attacks","year":"2002","author":"marty","key":"ref48"},{"year":"0","key":"ref47"},{"year":"2002","key":"ref42"},{"journal-title":"The NSS Group","article-title":"Intrusion Detection Systems: Group Test (Edition 2)","year":"2002","key":"ref41"},{"year":"2002","key":"ref44"},{"year":"2002","key":"ref43"}],"event":{"name":"Proceedings First IEEE International Workshop on Information Assurance. IWIA 2003","start":{"date-parts":[[2003,3,24]]},"location":"Darmstadt, Germany","end":{"date-parts":[[2003,3,24]]}},"container-title":["First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8484\/26740\/01192459.pdf?arnumber=1192459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T21:28:17Z","timestamp":1489440497000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1192459\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/iwias.2003.1192459","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}