The base-rate fallacy and its implications for the difficulty of intrusion detection

作者: Stefan Axelsson

DOI: 10.1145/319709.319710

关键词:

摘要: … More specifically it addresses the way in which the base-rate fallacy affects the … a description of the baserate fallacy, section 4 continues with an application of the base-rate fallacy to the …

参考文章(13)
D. Wyschogrod, D. J. Fried, K. R. Kendall, R. K. Cunningham, Richard Lippmann, Isaac Graf, S. E. Webster, S. L. Garfinkel, D. J. McClung, Richard P. Lippmann, D. J. Weber, A. S. Gorton, M. A. Zissman, The 1998 DARPA/AFRL Off-line Intrusion Detection Evaluation ,(1998)
Wenke Lee, S.J. Stolfo, K.W. Mok, A data mining framework for building intrusion detection models ieee symposium on security and privacy. pp. 120- 132 ,(1999) , 10.1109/SECPRI.1999.766909
Terran Lane, Carla E. Brodley, Temporal sequence learning and data reduction for anomaly detection computer and communications security. pp. 150- 158 ,(1998) , 10.1145/288090.288122
Robert A. J. Matthews, Base-rate errors and rain forecasts Nature. ,vol. 382, pp. 766- 766 ,(1996) , 10.1038/382766A0
Robert A. J. Matthews, Decision-theoretic limits on earthquake prediction Geophysical Journal International. ,vol. 131, pp. 526- 529 ,(1997) , 10.1111/J.1365-246X.1997.TB06596.X
H.S. Vaccaro, G.E. Liepins, Detection of anomalous computer session activity ieee symposium on security and privacy. pp. 280- 289 ,(1989) , 10.1109/SECPRI.1989.36302
Stuart J. Russell, Peter Norvig, Artificial Intelligence: A Modern Approach ,(2020)
C. Warrender, S. Forrest, B. Pearlmutter, Detecting intrusions using system calls: alternative data models ieee symposium on security and privacy. pp. 133- 145 ,(1999) , 10.1109/SECPRI.1999.766910
C. Ko, M. Ruschitzka, K. Levitt, Execution monitoring of security-critical programs in distributed systems: a specification-based approach ieee symposium on security and privacy. pp. 175- 187 ,(1997) , 10.1109/SECPRI.1997.601332
Ulf Gustafson, Ulf Lindqvist, Erland Jonsson, Stefan Axelsson, An Approach to UNIX Security Logging 1 ,(1998)