Modeling approaches for intrusion detection and prevention system return on investment

被引:0
|
作者
Leslie, Nandi O. [1 ]
Marvel, Lisa M. [1 ]
Edwards, Joshua [1 ]
Comroe, Kyra [1 ]
Shearer, Gregory [1 ]
Knachel, Lawrence [1 ]
机构
[1] US Army, Res Lab, 2800 Powder Mill Rd, Adelphi, MD 20783 USA
来源
CYBER SENSING 2017 | 2017年 / 10185卷
关键词
Intrusion detection; cybersecurity; metrics; resource utilization; return on investment; ANOMALY DETECTION;
D O I
10.1117/12.2258026
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Making decisions about intrusion detection and/or prevention system (IDPS) enhancements are often limited to tool effectiveness (i.e., predictive performance). However, in many cases, the tools in an IDPS are operating in information environments, where the malicious behavior is difficult to discern, and computational resources are limited. We develop three novel IDPS performance models motivated by the return on investment (ROI) metric, where each model is designed to compare each tool's relative contributions to the system-level performance over multiple scenarios and configurations. Each of our approaches combine statistical accuracy metrics and computational resource costs into one model to facilitate decision making on IDPS configurations.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Enterprise network intrusion detection and prevention system (ENIDPS)
    Akujuobi, C. M.
    Ampah, N. K.
    [J]. SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS AND INTELLIGENCE (C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE VI, 2007, 6538
  • [22] An Optimal Use of Intrusion Detection and Prevention System (IDPS)
    Kashif, Mhair
    Zahoor-ul-Haq
    [J]. 2015 European Intelligence and Security Informatics Conference (EISIC), 2015, : 190 - 190
  • [23] An intrusion detection and prevention system for IMS and VoIP services
    Nikos Vrakas
    Costas Lambrinoudakis
    [J]. International Journal of Information Security, 2013, 12 : 201 - 217
  • [24] Data Mining Techniques for Intrusion Detection and Prevention System
    Chalak, Ashok
    Harale, Naresh D.
    Bhosale, Rohini
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (08): : 200 - 203
  • [25] Modeling an Intrusion Detection System Based on Adaptive Immunology
    Alaparthy, Vishwa
    Morgera, Salvatore D.
    [J]. INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2019, 11 (02) : 42 - 55
  • [26] Random Forest Modeling for Network Intrusion Detection System
    Farnaaz, Nabila
    Jabbar, M. A.
    [J]. TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 213 - 217
  • [27] Modeling an Intelligent Architecture of Intrusion Detection System for MANETs
    Chadli, Sara
    Saber, Mohammed
    Emharraf, Mohamed
    Ziyyat, Abdelhak
    [J]. PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, 381 : 557 - 562
  • [28] Intrusion Detection System Using Bayesian Network Modeling
    Alocious, Chaminda
    Abouzakhar, Nasser
    Xiao, Hannan
    Christianson, Bruce
    [J]. PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 223 - 232
  • [29] Modeling of distributed intrusion detection using fuzzy system
    Seo, Heesuk
    Kim, Taekyung
    Kim, Hyungjong
    [J]. COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS, 2006, 4114 : 165 - 170
  • [30] Research of Intrusion Detection System Object Oriented Modeling
    Li, Linglin
    Tang, Jinpeng
    [J]. APPLIED MECHANICS, MATERIALS AND MANUFACTURING IV, 2014, 670-671 : 1507 - 1510