期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Feedback Reliability Ratio of an Intrusion Detection System 被引量:1
1
作者 Usha Banerjee Gaurav Batra k. v. arya 《Journal of Information Security》 2012年第3期238-244,共7页
The behavior and nature of attacks and threats to computer network systems have been evolving rapidly with the advances in computer security technology. At the same time however, computer criminals and other malicious... The behavior and nature of attacks and threats to computer network systems have been evolving rapidly with the advances in computer security technology. At the same time however, computer criminals and other malicious elements find ways and methods to thwart such protective measures and find techniques of penetrating such secure systems. Therefore adaptability, or the ability to learn and react to a consistently changing threat environment, is a key requirement for modern intrusion detection systems. In this paper we try to develop a novel metric to assess the performance of such intrusion detection systems under the influence of attacks. We propose a new metric called feedback reliability ratio for an intrusion detection system. We further try to modify and use the already available statistical Canberra distance metric and apply it to intrusion detection to quantify the dissimilarity between malicious elements and normal nodes in a network. 展开更多
关键词 ATTACKS Canberra METRIC FEEDBACK INTRUSION Detection Performance RELIABILITY
下载PDF
Optimizing Operating Cost of an Intrusion Detection System
2
作者 Usha Banerjee k. v. arya 《International Journal of Communications, Network and System Sciences》 2013年第1期29-36,共8页
Very often it so happens that the cost of operating an Intrusion Detection System (IDS) exceeds the cost of purchasing the IDS itself. In such cases, regular operation and maintenance of the system becomes expensive. ... Very often it so happens that the cost of operating an Intrusion Detection System (IDS) exceeds the cost of purchasing the IDS itself. In such cases, regular operation and maintenance of the system becomes expensive. Thus, it becomes essential to reduce the operating cost of the IDS without compromising on the performance and reliability of the IDS. Apart from the initial cost of procuring the IDS, other costs include cost of accessories required and cost of administration etc. In this paper we calculate the cost benefit tradeoffs of an IDS. We propose a method to determine the optimum operating point of the IDS. In an effort to solve the problems of the previously proposed metrics, we propose a decision tree based approach to calculate the cost of operating an IDS in a mobile ad hoc network. Mathematically and programmatically we deduce the minimum operating point of operation of an IDS and generate the receiver operating characteristic curve of the IDS. To further ascertain this, we use available network packet capture data and calculate the minimum operating cost of an IDS. The main motive behind this paper is to show that the cost of operating an IDS in a MANET can be minimized and hence the effectiveness and performance of the IDS can be maximized. 展开更多
关键词 DECISION TREE INTRUSION Detection Metrics MEASUREMENTS RECEIVER Operating Characteristics
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部