Toward cost-sensitive modeling for intrusion detection and response

作者: Wenke Lee , Wei Fan , Matthew Miller , Salvatore J. Stolfo , Erez Zadok

DOI: 10.3233/JCS-2002-101-202

关键词: Software deploymentIntrusion detection systemDamage costCost sensitiveReliability engineeringOperational costsExpected costFactor costData miningSecurity policyComputer science

摘要: Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion …

参考文章(17)
ROBERT P. CAMPBELL, GERALD A. SANDS, A modular approach to computer security risk management 1979 International Workshop on Managing Requirements Knowledge (MARK). ,(1979) , 10.1109/MARK.1979.8817285
Julia Allen, Alan Christie, William Fithen, John McHugh, Jed Pickel, State of the Practice of Intrusion Detection Technologies Defense Technical Information Center. ,(2000) , 10.21236/ADA375846
Matthew Miller, Learning Cost-Sensitive Classification Rules for Network Intrusion Detection using RIPPER Department of Computer Science, Columbia University. ,(1999) , 10.7916/D8CZ3G01
William W. Cohen, Fast Effective Rule Induction Machine Learning Proceedings 1995. pp. 115- 123 ,(1995) , 10.1016/B978-1-55860-377-6.50023-2
Wei Fan, Wenke Lee, Salvatore J. Stolfo, Matthew Miller, A Multiple Model Cost-Sensitive Approach for Intrusion Detection european conference on machine learning. pp. 142- 153 ,(2000) , 10.1007/3-540-45164-1_15
Wenke Lee, S.J. Stolfo, K.W. Mok, A data mining framework for building intrusion detection models ieee symposium on security and privacy. pp. 120- 132 ,(1999) , 10.1109/SECPRI.1999.766909
R.P. Lippmann, D.J. Fried, I. Graf, J.W. Haines, K.R. Kendall, D. McClung, D. Weber, S.E. Webster, D. Wyschogrod, R.K. Cunningham, M.A. Zissman, Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation darpa information survivability conference and exposition. ,vol. 2, pp. 12- 26 ,(2000) , 10.1109/DISCEX.2000.821506