Controlled anomaly injection into network traffic for stress-testing of intrusion detection systems

Authors

  • Roman I. Naumenko Національний університет «Одеська політехніка», пр. Шевченка, 1. Одеса, 65044, Україна Автор
  • Viktor S. Buiukli Odesa Polytechnic National University. 1, Shevchenko Ave. Odesa, 65044, Ukraine Автор
  • Petr M. Tishyn Odesa Polytechnic National University. 1, Shevchenko Ave. Odesa, 65044, Ukraine Автор
  • Oleksandr N. Martynyuk Odesa Polytechnic National University. 1, Shevchenko Ave. Odesa, 65044, Ukraine Автор

DOI:

https://doi.org/10.15276/ict.02.2025.23

Keywords:

controlled anomaly injection, network traffic, stress testing, IDS, low-and-slow attacks, DevSecOps

Abstract

In modern dynamic networks where traffic encryption and sophisticated “low-and-slow” attacks are becoming the norm, classical approaches to testing Intrusion Detection Systems (IDS) are proving to be inadequate. Existing static datasets fail to reflect either modern multi-stage attack scenarios or the diversity of legitimate background traffic, leading to unrepresentative evaluations. This paper proposes a comprehensive methodology of controlled anomaly injection for the systematic and reproducible stress-testing of IDS in a laboratory environment. In contrast to outdated practices, the proposed framework introduces clearly defined and controlled injection parameters. This allows for flexible configuration of the intensity, duration, spatio-temporal locality, stealth level, and semantics of scenarios, covering reconnaissance, denial-of-service attacks, credential brute-forcing, and covert data exfiltration.Such an approach enables the targeted "tuning" of test complexity and the transparent comparison of different IDS implementations. A key advantage is its complete independence from any specific synthesis technology; the methodology is compatible with various generators, including modern diffusion models. This ensures the long-term relevance of the framework, allowing it to evolve alongside the development of generative technologies. Injections are integrated into existing traces or cogenerated with a realistic background, maintaining guaranteed reproducibility through standardized descriptive manifests. These manifests record tool versions, random generator seeds, and artifact checksums. Thus, not only the attack conditions but also the evaluation protocol are standardized.Pilot tests are planned and expected to demonstrate the controlled impact of the parameters on IDS behavior. It is anticipated that with an increase in stealth, signature-based detectors will lose effectiveness, while behavioral detectors will show a measurable increase in reaction time. This will make it possible to investigate their operational limits, analyze false positive rates, and evaluate the resource behavior of the systems under load. The findings should confirm the methodology's suitability for the systematic assessment of resilience and the identification of “blind spots.” Security and ethical aspects are considered separately. Future work outlines the integration of the framework with CI/CD processes to foster a culture of continuous security validation (DevSecOps), and the publication of open, reproducible benchmarks. 

Downloads

Download data is not yet available.

Author Biographies

  • Roman I. Naumenko, Національний університет «Одеська політехніка», пр. Шевченка, 1. Одеса, 65044, Україна

    PhD Student of the Department of Intellectual Systems and Networks

  • Viktor S. Buiukli, Odesa Polytechnic National University. 1, Shevchenko Ave. Odesa, 65044, Ukraine

    PhD Student of the Department of Computer Intellectual Systems and Networks

  • Petr M. Tishyn, Odesa Polytechnic National University. 1, Shevchenko Ave. Odesa, 65044, Ukraine

    PhD, Associate Professor of the Department of Computer Intellectual Systems and Networks

    Scopus Author ID: 57190400970

  • Oleksandr N. Martynyuk, Odesa Polytechnic National University. 1, Shevchenko Ave. Odesa, 65044, Ukraine

    PhD, Associate Professor of the Department of Computer Intellectual Systems and Networks

    Scopus Author ID: 57103391900

Published

2025-11-05

How to Cite

Controlled anomaly injection into network traffic for stress-testing of intrusion detection systems. (2025). Інформатика. Культура. Техніка, 2, 160–164. https://doi.org/10.15276/ict.02.2025.23

Most read articles by the same author(s)