False Positive Responses Optimization for Intrusion Detection System

作者: Jalal Baayer , Boubker Regragui , Aziz Baayer

DOI: 10.4236/JIS.2014.52003

关键词:

摘要: In Intrusion Detection Systems (IDS), the operation costs represent one of the big challenges for researchers. They are apart from IDS cost acquisition and they comprise maintenance, administration, response, running errors reactions costs. present paper, we focus on missed which include False Positive (FP) and False Negative (FN) reactions. For that a new optimization model is proposed IDS. This proposes minimal interval where IDSs work optimally. simulation, found this as trade-off between the damage FP.

参考文章(33)
Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar, A service dependency model for cost-sensitive intrusion response european symposium on research in computer security. pp. 626- 642 ,(2010) , 10.1007/978-3-642-15497-3_38
Ivan Balepin, Sergei Maltsev, Jeff Rowe, Karl Levitt, Using specification-based intrusion detection for Automated response recent advances in intrusion detection. pp. 136- 154 ,(2003) , 10.1007/978-3-540-45248-5_8
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok, Toward cost-sensitive modeling for intrusion detection and response Journal of Computer Security. ,vol. 10, pp. 5- 22 ,(2002) , 10.3233/JCS-2002-101-202
Jim Mellander, Carl Endorf, Kompas, Eugene Schultz, Intrusion detection & prevention ,(2003)
R.P. Lippmann, D.J. Fried, I. Graf, J.W. Haines, K.R. Kendall, D. McClung, D. Weber, S.E. Webster, D. Wyschogrod, R.K. Cunningham, M.A. Zissman, Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation darpa information survivability conference and exposition. ,vol. 2, pp. 12- 26 ,(2000) , 10.1109/DISCEX.2000.821506
Stefano Zanero, Sergio M. Savaresi, Unsupervised learning techniques for an intrusion detection system acm symposium on applied computing. pp. 412- 419 ,(2004) , 10.1145/967900.967988
Chengpo Mu, Yingjiu Li, An intrusion response decision-making model based on hierarchical task network planning Expert Systems With Applications. ,vol. 37, pp. 2465- 2472 ,(2010) , 10.1016/J.ESWA.2009.07.079
John McHugh, Alan Christie, Julia Allen, Defending Yourself: The Role of Intrusion Detection Systems IEEE Software. ,vol. 17, pp. 42- 51 ,(2000) , 10.1109/52.877859
Nor Badrul Anuar, Maria Papadaki, Steve Furnell, Nathan Clarke, An investigation and survey of response options for Intrusion Response Systems (IRSs) information security for south africa. pp. 1- 8 ,(2010) , 10.1109/ISSA.2010.5588654