LARIAT: Lincoln adaptable real-time information assurance testbed

The Lincoln adaptable real-time information assurance testbed, LARIAT, is an extension of the testbed created for DARPA 1998 and 1999 intrusion detection (ID) evaluations. LARIAT supports real-time, automated and quantitative evaluations of ID systems and other information assurance (IA) technologies. Components of LARIAT generate realistic background user traffic and real network attacks, verify attack success or failure, score ID system performance, and provide a graphical user interface for control and monitoring. Emphasis was placed on making LARIAT easy to adapt, configure and run without requiring a detailed understanding of the underlying complexity. LARIAT is currently being exercised at four sites and is undergoing continued development and refinement.

[1]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[2]  Richard P. Lippmann,et al.  1999 DARPA Intrusion Detection Evaluation: Design and Procedures , 2001 .

[3]  Kristopher Kendall,et al.  A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems , 1999 .

[4]  Richard Lippmann,et al.  Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation , 2000, Recent Advances in Intrusion Detection.

[5]  Greg Shipley,et al.  Cover story: dragon claws its way to the top , 2001 .

[6]  Eric Miller,et al.  Testing and evaluating computer intrusion detection systems , 1999, CACM.

[7]  Don Libes Exploring expect - a Tcl-based toolkit for automating interactive programs (2. ed.) , 1995 .

[8]  Robert K. Cunningham,et al.  Building Scenarios from a Heterogeneous Alert Stream , 2001 .

[9]  R.K. Cunningham,et al.  Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[10]  Robert K. Cunningham,et al.  Host-based Bottleneck Verification Efficiently Detects Novel Computer Attacks 1 , 1999 .

[11]  Richard Lippmann,et al.  The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.

[12]  Steven J. Templeton,et al.  A requires/provides model for computer attacks , 2001, NSPW '00.

[13]  Jonathan Korba Windows NT Attacks for the Evaluation of Intrusion Detection Systems , 2000 .