Intrusion-detection policies for IT security breaches

被引:15
|
作者
Ogut, Hulisi [1 ]
Cavusoglu, Huseyin [2 ]
Raghunathan, Srinivasan [2 ]
机构
[1] TOBB Univ Econ & Technol, Dept Business Adm, TR-06560 Ankara, Turkey
[2] Univ Texas Dallas, Sch Management, Richardson, TX 75083 USA
关键词
IT security; dynamic programming; stochastic model applications; decision analysis;
D O I
10.1287/ijoc.1070.0222
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Intrusion-detection systems (IDSs) form an important component of IT security architectures, but the low proportion of hackers in the user population severely limits the usefulness of IDSs. Thus, even when the IDS is good, an intrusion signal may not imply that the user is more likely to be a hacker than a normal user. Ignoring the low base rate for the proportion of hackers results in acting on every intrusion signal, which is costly because of the high rate of false alarms. This problem is known as the base-rate fallacy in IDSs. On the other hand, ignoring intrusion signals renders IDSs useless. We propose and analyze waiting-time policies, which specify a response to signals from IDSs. We formulate the problem as a stochastic dynamic programming model and derive the optimal waiting time before acting upon an intrusion signal. Because the optimal policy is difficult to implement in many situations, we also derive and theoretically analyze a myopic policy. Our simulations suggest that the behavior of the myopic policy is qualitatively similar to that of the optimal policy. Further, the myopic policy performs better than other policies often used in practice, such as the Bayes policy and m-strike policies. The myopic policy can be implemented easily in a decision support system that supplements an IDS to mitigate the base-rate fallacy and to improve the value of the IDS.
引用
收藏
页码:112 / 123
页数:12
相关论文
共 50 条
  • [31] Intrusion detection: Introduction to intrusion detection and security information management
    Debar, H
    Viinikka, J
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 207 - 236
  • [32] Internet security and intrusion detection
    Kemmerer, RA
    Vigna, G
    25TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2003, : 748 - 749
  • [33] Two-Frequency Surveillance Technique for Intrusion-Detection Sensor with Leaky Coaxial Cables
    Inomata, Kenji
    Tsujita, Wataru
    Hirai, Takashi
    2014 IEEE SENSORS APPLICATIONS SYMPOSIUM (SAS), 2014, : 103 - 106
  • [34] Security challenges in intrusion detection
    Jouad, Mohammed
    Diouani, Sara
    Houmani, Hanane
    Zaki, Ali
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 350 - 360
  • [35] Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems
    Medina-Arco, Joaquin Gaspar
    Magan-Carrion, Roberto
    Rodriguez-Gomez, Rafael Alejandro
    Garcia-Teodoro, Pedro
    SENSORS, 2024, 24 (02)
  • [36] Intrusion-detection for incident-response, using a military battlefield-intelligence process
    Yuill, J
    Wu, F
    Settle, J
    Gong, F
    Forno, R
    Huang, M
    Asbery, J
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2000, 34 (04): : 671 - 697
  • [37] CMShark: A NetFlow and machine-learning based crypto-jacking intrusion-detection method
    Danesh, Hamed
    Karimi, Mohammad Bagher
    Arasteh, Bahman
    Intelligent Decision Technologies, 2024, 18 (03): : 2255 - 2273
  • [38] BREACHES OF COMPUTER SECURITY
    LLAURADO, JG
    INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1983, 14 (02): : 87 - 93
  • [39] Investigating security breaches
    Casey, Eoghan
    DIGITAL INVESTIGATION, 2005, 2 (03) : 169 - 170
  • [40] FBG security fence for intrusion detection
    Saleh, Chebaane
    Mohsen, Machhout
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2017,