Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems

نویسندگان

  • Guofei Gu
  • Prahlad Fogla
  • David Dagon
  • Wenke Lee
  • Boris Skoric
چکیده

Model: Treat IDS as a black box Intrusion detection capability CID = I(X ;Y ) H(X) ): How much (normalized) ground truth information an IDS can identify [Gu et al. ASIACCS’06] take into account all aspects of detection capability an intrinsic measure of intrusion detection capability an objective trade-off between FP and FN (without involving subjective cost) yields a series of related information-theoretic metrics very sensitive and easy to demonstrate the effect of subtle changes of an IDS Guofei Gu et al. An Information-Theoretic Framework for Analyzing IDSs Motivation An Information-Theoretic Framework for Analyzing IDSs Experiments Summary Modeling an IDS Connection to Information Theory Simplified Model Analysis Implication Sensitivity analysis 10 −7 10 −6 10 −5 10 −4 10 −3 10 −4 10 −2 10 0 10 2 10 4 10 6 Percent of Intrusion data (base rate B) D er iv at iv e (in a bs ol ut e va lu e) |∂P e /∂B| |∂C ID /∂B| 10 −3 10 −2 10 −1 10 −1 10 0 10 1 10 2 False Positive Rate (α) D er iv at iv e (in a bs ol ut e va lu e) |∂P e /∂α| |∂C ID /∂α| 10 −3 10 −2 10 −1 10 −5 10 −4 10 −3 10 −2 10 −1 10 0 10 1 False Negative Rate (β) D er iv at iv e (in a bs ol ut e va lu e) |∂P e /∂β| |∂C ID /∂β| Guofei Gu et al. An Information-Theoretic Framework for Analyzing IDSs Motivation An Information-Theoretic Framework for Analyzing IDSs Experiments Summary Modeling an IDS Connection to Information Theory Simplified Model Analysis Implication

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ارائه مدلی جهت استفاده ازعاملهای متحرک در سیستم های تشخیص نفوذ توزیع شده مبتنی بر تئوری بازی

The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value...

متن کامل

Improving Accuracy in Intrusion Detection Systems Using Classifier Ensemble and Clustering

Recently by developing the technology, the number of network-based servicesis increasing, and sensitive information of users is shared through the Internet.Accordingly, large-scale malicious attacks on computer networks could causesevere disruption to network services so cybersecurity turns to a major concern fornetworks. An intrusion detection system (IDS) could be cons...

متن کامل

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

A Hybrid Framework for Building an Efficient Incremental Intrusion Detection System

In this paper, a boosting-based incremental hybrid intrusion detection system is introduced. This system combines incremental misuse detection and incremental anomaly detection. We use boosting ensemble of weak classifiers to implement misuse intrusion detection system. It can identify new classes types of intrusions that do not exist in the training dataset for incremental misuse detection. As...

متن کامل

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006