Intrusion-detection policies for IT security breaches

被引:15
|
作者
Ogut, Hulisi [1 ]
Cavusoglu, Huseyin [2 ]
Raghunathan, Srinivasan [2 ]
机构
[1] TOBB Univ Econ & Technol, Dept Business Adm, TR-06560 Ankara, Turkey
[2] Univ Texas Dallas, Sch Management, Richardson, TX 75083 USA
关键词
IT security; dynamic programming; stochastic model applications; decision analysis;
D O I
10.1287/ijoc.1070.0222
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Intrusion-detection systems (IDSs) form an important component of IT security architectures, but the low proportion of hackers in the user population severely limits the usefulness of IDSs. Thus, even when the IDS is good, an intrusion signal may not imply that the user is more likely to be a hacker than a normal user. Ignoring the low base rate for the proportion of hackers results in acting on every intrusion signal, which is costly because of the high rate of false alarms. This problem is known as the base-rate fallacy in IDSs. On the other hand, ignoring intrusion signals renders IDSs useless. We propose and analyze waiting-time policies, which specify a response to signals from IDSs. We formulate the problem as a stochastic dynamic programming model and derive the optimal waiting time before acting upon an intrusion signal. Because the optimal policy is difficult to implement in many situations, we also derive and theoretically analyze a myopic policy. Our simulations suggest that the behavior of the myopic policy is qualitatively similar to that of the optimal policy. Further, the myopic policy performs better than other policies often used in practice, such as the Bayes policy and m-strike policies. The myopic policy can be implemented easily in a decision support system that supplements an IDS to mitigate the base-rate fallacy and to improve the value of the IDS.
引用
收藏
页码:112 / 123
页数:12
相关论文
共 50 条
  • [41] Improving of the Security of Intrusion Detection System
    Komar, Myroslav
    Sachenko, Anatoly
    Kochan, Volodymyr
    Ababii, Victor
    2016 13TH INTERNATIONAL CONFERENCE ON DEVELOPMENT AND APPLICATION SYSTEMS (DAS 2016), 2016, : 315 - 319
  • [42] Intrusion Detection for Enhancing RPL Security
    Gothawal, Deepali Bankatsingh
    Nagaraj, S. V.
    2ND INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING ICRTAC -DISRUP - TIV INNOVATION , 2019, 2019, 165 : 565 - 572
  • [43] Network security monitoring - Intrusion detection
    Davis, J
    Hill, E
    Spradley, L
    Wright, M
    Scherer, W
    Zhang, YY
    2003 IEEE SYSTEMS & INFORMATION ENGINEERING DESIGN SYMPOSIUM, 2003, : 241 - 246
  • [44] Security agility in response to intrusion detection
    Petkac, M
    Badger, L
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 11 - 20
  • [45] Fight security breaches
    Coombes, P
    ELECTRONICS WORLD, 2005, 111 (1829): : 47 - 47
  • [46] CMShark: A NetFlow and machine-learning based crypto-jacking intrusion-detection method
    Danesh, Hamed
    Karimi, Mohammad Bagher
    Arasteh, Bahman
    INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS, 2024, 18 (03): : 2255 - 2273
  • [47] A Scalable Architecture for Intrusion-Detection Systems Based on a Broadband Network of Embedded Set-Top Boxes
    Neill, Richard
    Carloni, Luca P.
    2011 IEEE 54TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2011,
  • [48] Record fine for security breaches
    Johnson, Jeff
    CHEMICAL & ENGINEERING NEWS, 2007, 85 (30) : 8 - 8
  • [49] A technique research of intrusion detection on network security
    Yang, QX
    Han, X
    ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, : 4721 - 4724
  • [50] A generic intrusion detection game model in IT security
    Kantzavelou, Ioanna
    Katsikas, Sokratis
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2008, 5185 : 151 - +