Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
نویسندگان
چکیده
Model: Treat IDS as a black box Intrusion detection capability CID = I(X ;Y ) H(X) ): How much (normalized) ground truth information an IDS can identify [Gu et al. ASIACCS’06] take into account all aspects of detection capability an intrinsic measure of intrusion detection capability an objective trade-off between FP and FN (without involving subjective cost) yields a series of related information-theoretic metrics very sensitive and easy to demonstrate the effect of subtle changes of an IDS Guofei Gu et al. An Information-Theoretic Framework for Analyzing IDSs Motivation An Information-Theoretic Framework for Analyzing IDSs Experiments Summary Modeling an IDS Connection to Information Theory Simplified Model Analysis Implication Sensitivity analysis 10 −7 10 −6 10 −5 10 −4 10 −3 10 −4 10 −2 10 0 10 2 10 4 10 6 Percent of Intrusion data (base rate B) D er iv at iv e (in a bs ol ut e va lu e) |∂P e /∂B| |∂C ID /∂B| 10 −3 10 −2 10 −1 10 −1 10 0 10 1 10 2 False Positive Rate (α) D er iv at iv e (in a bs ol ut e va lu e) |∂P e /∂α| |∂C ID /∂α| 10 −3 10 −2 10 −1 10 −5 10 −4 10 −3 10 −2 10 −1 10 0 10 1 False Negative Rate (β) D er iv at iv e (in a bs ol ut e va lu e) |∂P e /∂β| |∂C ID /∂β| Guofei Gu et al. An Information-Theoretic Framework for Analyzing IDSs Motivation An Information-Theoretic Framework for Analyzing IDSs Experiments Summary Modeling an IDS Connection to Information Theory Simplified Model Analysis Implication
منابع مشابه
ارائه مدلی جهت استفاده ازعاملهای متحرک در سیستم های تشخیص نفوذ توزیع شده مبتنی بر تئوری بازی
The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value...
متن کاملImproving Accuracy in Intrusion Detection Systems Using Classifier Ensemble and Clustering
Recently by developing the technology, the number of network-based servicesis increasing, and sensitive information of users is shared through the Internet.Accordingly, large-scale malicious attacks on computer networks could causesevere disruption to network services so cybersecurity turns to a major concern fornetworks. An intrusion detection system (IDS) could be cons...
متن کاملA hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection
A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...
متن کاملA Hybrid Framework for Building an Efficient Incremental Intrusion Detection System
In this paper, a boosting-based incremental hybrid intrusion detection system is introduced. This system combines incremental misuse detection and incremental anomaly detection. We use boosting ensemble of weak classifiers to implement misuse intrusion detection system. It can identify new classes types of intrusions that do not exist in the training dataset for incremental misuse detection. As...
متن کاملIntrusion Detection in IOT based Networks Using Double Discriminant Analysis
Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...
متن کامل