Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

An Evaluation Design for Comparing Netflow Based Network Anomaly Detection Systems Using Synthetic Malicious Traffic

Published

Author(s)

Shuvo Bardhan, Mitsuhiro Hatada, James Filliben, Douglas Montgomery, Alexander Jia

Abstract

In this paper, we present an evaluation procedure for comparing multiple netflow based network anomaly detection (NF-NAD) systems based on accuracy of detection and mean time of detection. Conventionally, different variations of benign or normal traffic have been used to evaluate NF-NAD systems. Here we showcase a methodology where benign traffic is constant through the entirety of the experiment. We create different variations of synthetic malicious traffic (instead of benign traffic) to evaluate and compare NF-NAD systems. We achieve this through a two-phase approach, where Phase I and Phase II are conjointly used to measure the accuracy and learning capability of the NF-NAD system. We have created a designed experiment (having factors, levels and design points) to showcase our methodology. Keywords:
Citation
Technical Note (NIST TN) - 2142
Report Number
2142

Keywords

Network Anomaly Detection Systems, Experiment Design, Netflows, Computer Worms

Citation

Bardhan, S. , Hatada, M. , Filliben, J. , Montgomery, D. and Jia, A. (2021), An Evaluation Design for Comparing Netflow Based Network Anomaly Detection Systems Using Synthetic Malicious Traffic, Technical Note (NIST TN), National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.TN.2142, https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=931392 (Accessed April 18, 2024)
Created March 2, 2021, Updated April 6, 2021