-1

I am currently working on a project "Creating rules for network intrusion detection for snort IDS". snort IDS uses network packet header attributes(e.g. ttl,ip,etc.) for the rules. I am currently using KDD 1999 dataset for rule creation part. But, I am finding it hard to map KDD attributes to tcp header attributes. Is there any new dataset which i can use to create the rules for snort?

NorthCat
  • 9,643
  • 16
  • 47
  • 50

2 Answers2

0

it is better to use your own traffic trace.

wireshark or ms network monitor.

these tool help you collecting application's traffic.

http://snorgen.korea.ac.kr/ this web site might help you create snort rule.

0

if you are mentioning about 44 kdd features, then notice that these are aggregated features (most of them). if you want to encode them in snort style rules, you need to reverse engineer (in a way) feature set i.e. from feature values to received packets. Snort has temporal style rules (if I remember) by which you can define rules across packets. I am not sure how much easy/difficult it is, though.

Sanjay
  • 95
  • 2
  • 14