Development of an Attack Packet Generator Applying an NP to the Intelligent APS

  • Wankyung Kim
  • Wooyoung Soh
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4252)


Security systems need be tested on the network, when they are developed, for their security test and performance evaluation. Even though the security tests have to be done on the real network but, it is usually tested in a virtual test environment. APS (Attack Packet Simulator) is one of tools for performance test of security system on the virtual environment. In this paper, the development of an attack packet generator extracts the attack information from Snort rule and creates attack information in the Database using the extracted information applying intelligent APS. Also, the proposed generator generates high speed network attack packets to closely assimilate the real network for security system tests using an NP (Network Processor).


Security System Real Network Packet Generator Network Processor Attack Information 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Jeon, J., Soh, W.: Design and Implementation of An Attack Packet Simulator for Performance test of Information Security System. In: ICCMSE 2005 (2005)Google Scholar
  2. 2.
    Martin Roesch, Chris Green, SourceFire, INC.: Snort Users Manual,
  3. 3.
    Sniph, Snot (2001),
  4. 4.
    Mutz, D., Vigna, G., Kemmerer, R.: An Experience Developing an IDS Simulator for the Black-Box Testing of Network Intrusion Detection Systems (2003)Google Scholar
  5. 5.
  6. 6.
    Puketza, N.J., Zhang, K., Chung, M., Mukherjee, B., Olsson, R.A.: A Methodology for Testing Intrusion Detection System. IEEE Transactions on Software Engineering 22(10), 719–729 (1996)CrossRefGoogle Scholar
  7. 7.
    Debar, H., Dacier, M., Wespi, A., Lampart, S.: An Experimentation Workbench for Intrusion Detection Systems, IBM Zurich Lab, Research Report (1998)Google Scholar
  8. 8.
    Lippmann, R.P., Fried, D.J., Graf, I., Haines, J.W., Kend-all, K.R., McClung, D., Weber, D., Webster, S.E., Wyschogrod, D., Cun-ningham, R.K., Zissman, M.A.: Evaluation Intrusion Detection Systems: the 1998 DARPA Off-Line Intrusion Detection Evaluation. In: Proceedings of the 2000 DARPA In-formation Survivability Conference and Exposition (2000)Google Scholar
  9. 9.
    Durst, R., Champion, T., Written, B., Miller, E., Spagnuolo, L.: Testing and Evaluating Computer Intrusion Detection Systems. Communication of the ACM 42(7), 53–61 (1999)CrossRefGoogle Scholar
  10. 10.
    CCRA(Arrangement on the Recognition of Common Criteria Certificates),
  11. 11.
    CC: Common Criteria for Information Technology Security Evaluation, Version 2.1, CCIMB-99-031 (1999) Google Scholar
  12. 12.
    An NSS Group Report V 1.0, Intrusion Prevention Systems(IPS), Group Test, NSS, (January 2004)Google Scholar
  13. 13.
    RadiSys Corporation, Linux Setup guide for ENP-XXXX,
  14. 14.
    RadiSys Corporation, ENP-2506 Hardware Reference Manual,
  15. 15.
    Intel Corporation, IXP1200 Hardware Reference Manual,

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Wankyung Kim
    • 1
  • Wooyoung Soh
    • 1
  1. 1.Department of Computer EngineeringHannam UniversityDaejeonS. Korea

Personalised recommendations