A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data

  • Jaeik Cho
  • , Changhoon Lee*
  • , Sanghyun Cho
  • , Jung Hwan Song
  • , Jongin Lim
  • , Jongsub Moon
  • *Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    Abstract

    In network data analysis, research about how accurate the estimation model represents the universe is inevitable. As the speed of the network increases, so will the attacking methods on future generation communication network. To correspond to these wide variety of attacks, intrusion detection systems and intrusion prevention systems also need a wide variety of counter measures. As a result, an effective method to compare and analyze network data is needed. These methods are needed because when a method to compare and analyze network data is effective, the verification of intrusion detection systems and intrusion prevention systems can be trusted. In this paper, we use extractable standard protocol information of network data to compare and analyze the data of MIT Lincoln Lab with the data of KDD CUP 99 (modeled from Lincoln Lab). Correspondence Analysis and statistical analyzing method is used for comparing data.

    Original languageEnglish
    Pages (from-to)431-435
    Number of pages5
    JournalSimulation Modelling Practice and Theory
    Volume18
    Issue number4
    DOIs
    Publication statusPublished - 2010 Apr

    Bibliographical note

    Funding Information:
    This work was supported by Hanshin University Research Grant .

    Keywords

    • Data set
    • Intrusion detection
    • KDD CUP 99
    • Network data modeling
    • Network data quantification

    ASJC Scopus subject areas

    • Software
    • Modelling and Simulation
    • Hardware and Architecture

    Fingerprint

    Dive into the research topics of 'A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data'. Together they form a unique fingerprint.

    Cite this