Abstract—We focus in this paper to improve the level of intrusion detection system (IDS). This improvement is based on three research areas: classification of attacks, generation of attack scenarios and finally evaluation methods. We will discuss in this article the second area, which consists on the research of meaningful scenarios in order to minimize false and positive alerts reported by an IDS. We will present two algorithms generating these scenarios. The first one allows the conversion of the problem to a constraint programming problem (CSP) and the second one is based on an algorithm to search the shortest path. We will also compare the results of these two algorithms.
Index Terms—Scenario, attack, evaluation, IDS, CSP, CHOCO.
Mohammed SABER and Toumi Bouchentouf are with Department of Computer Science, National School of Applied Sciences, Mohammed First University, Oujda, Morocco (e-mail: firstname.lastname@example.org, email@example.com).
Abdelhamid Benazzi, is with Department of Computer Science, High School of Technology, Mohammed First University, Oujda, Morocco (e-mail: firstname.lastname@example.org).
Cite: Mohammed Saber, Toumi Bouchentouf, and Abdelhamid Benazzi, "Generation of Attack Scenarios by Modeling Algorithms for Evaluating and Testing IDS," International Journal of Computer Theory and Engineering vol. 4, no. 2, pp. 171-176, 2012.