Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

An Evaluation Design for Comparing Netflow Based Network Anomaly Detection Systems Using Synthetic Malicious Traffic

Published

Author(s)

Shuvo Bardhan, Mitsuhiro Hatada, James Filliben, Douglas Montgomery, Alexander Jia

Abstract

In this paper, we present an evaluation procedure for comparing multiple netflow based network anomaly detection (NF-NAD) systems based on accuracy of detection and mean time of detection. Conventionally, different variations of benign or normal traffic have been used to evaluate NF-NAD systems. Here we showcase a methodology where benign traffic is constant through the entirety of the experiment. We create different variations of synthetic malicious traffic (instead of benign traffic) to evaluate and compare NF-NAD systems. We achieve this through a two-phase approach, where Phase I and Phase II are conjointly used to measure the accuracy and learning capability of the NF-NAD system. We have created a designed experiment (having factors, levels and design points) to showcase our methodology. Keywords:
Citation
Technical Note (NIST TN) - 2142
Report Number
2142

Keywords

Network Anomaly Detection Systems, Experiment Design, Netflows, Computer Worms

Citation

Bardhan, S. , Hatada, M. , Filliben, J. , Montgomery, D. and Jia, A. (2021), An Evaluation Design for Comparing Netflow Based Network Anomaly Detection Systems Using Synthetic Malicious Traffic, Technical Note (NIST TN), National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.TN.2142, https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=931392 (Accessed October 13, 2025)

Issues

If you have any questions about this publication or are having problems accessing it, please contact [email protected].

Created March 2, 2021, Updated April 6, 2021
Was this page helpful?