Intrusion-detection policies for IT security breaches

被引:15
|
作者
Ogut, Hulisi [1 ]
Cavusoglu, Huseyin [2 ]
Raghunathan, Srinivasan [2 ]
机构
[1] TOBB Univ Econ & Technol, Dept Business Adm, TR-06560 Ankara, Turkey
[2] Univ Texas Dallas, Sch Management, Richardson, TX 75083 USA
关键词
IT security; dynamic programming; stochastic model applications; decision analysis;
D O I
10.1287/ijoc.1070.0222
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Intrusion-detection systems (IDSs) form an important component of IT security architectures, but the low proportion of hackers in the user population severely limits the usefulness of IDSs. Thus, even when the IDS is good, an intrusion signal may not imply that the user is more likely to be a hacker than a normal user. Ignoring the low base rate for the proportion of hackers results in acting on every intrusion signal, which is costly because of the high rate of false alarms. This problem is known as the base-rate fallacy in IDSs. On the other hand, ignoring intrusion signals renders IDSs useless. We propose and analyze waiting-time policies, which specify a response to signals from IDSs. We formulate the problem as a stochastic dynamic programming model and derive the optimal waiting time before acting upon an intrusion signal. Because the optimal policy is difficult to implement in many situations, we also derive and theoretically analyze a myopic policy. Our simulations suggest that the behavior of the myopic policy is qualitatively similar to that of the optimal policy. Further, the myopic policy performs better than other policies often used in practice, such as the Bayes policy and m-strike policies. The myopic policy can be implemented easily in a decision support system that supplements an IDS to mitigate the base-rate fallacy and to improve the value of the IDS.
引用
收藏
页码:112 / 123
页数:12
相关论文
共 50 条
  • [1] Intrusion-detection environment for information-security instruction
    Rowe, Neil C.
    Proceedings - Frontiers in Education Conference, 1999, 3 : 9 - 6
  • [2] AN INTRUSION-DETECTION MODEL
    DENNING, DE
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232
  • [3] Towards a taxonomy of intrusion-detection systems
    IBM Research Division, Zurich Res. Lab., S., Rüschlikon, Switzerland
    Comput. Networks, 8 (805-822):
  • [4] Towards a taxonomy of intrusion-detection systems
    Debar, H
    Dacier, M
    Wespi, A
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08): : 805 - 822
  • [5] Setting optimal intrusion-detection thresholds
    Soh, BC
    Dillon, TS
    COMPUTERS & SECURITY, 1995, 14 (07) : 621 - 631
  • [6] A revised taxonomy for intrusion-detection systems
    Debar, H
    Dacier, M
    Wespi, A
    ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2000, 55 (7-8): : 361 - 378
  • [7] INTRUSION-DETECTION APPROACH VIA ADAPTIVE PREDICTION
    AHMED, N
    FOGLER, RJ
    SOLDAN, DL
    ELLIOTT, GR
    BOURGEOIS, NA
    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 1979, 15 (03) : 430 - 438
  • [8] Intrusion-detection system protects workers and trains
    Abaffy, Luke
    ENR (Engineering News-Record), 2016, 275 (38):
  • [9] POSITIVE TRAIN CONTROL SECURITY An Intrusion-Detection System to Provide Cyber-Situational Awareness
    Kolli, Satish
    Lilly, Joshua
    Wijesekera, Duminda
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2018, 13 (03): : 48 - 60
  • [10] An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions
    Abdel-Basset, Mohamed
    Gamal, Abduallah
    Sallam, Karam M.
    Elgendi, Ibrahim
    Munasinghe, Kumudu
    Jamalipour, Abbas
    SENSORS, 2022, 22 (11)