Analysis of False Alarms during System Design
نویسندگان
چکیده
The problem of false alarms in electronic monitoring systems has grown over the last decade. This growth has been associated with increasing system complexity and advances in the state of the art. Studies have shown that some systems exhibit as many as 40% or more “false pulls,” and associated with the false-alarm problem, a large volume of wasted or ineffective maintenance actions exist. What is a false alarm? Can the extent of the problem be anticipated by the designer? Can a designer take steps to eliminate or reduce the effects of false alarms? This paper explores the answers to these questions by describing field maintenance data, prediction models, and analytical techniques.
منابع مشابه
Transition Potential Modeling of Land-Cover based on Similarity Weighted Instance-based Learning Procedure and Its Implication in the REDD Project Design Document
Reducing Emissions from Deforestation and Forest Degradation (REDD) is a climate change mitigation strategy employed to reduce the intensity of deforestation and GHGS emissions. In recent decades, drastic land use changes in Mazandaran province caused a substantial reduction in the amount of Hyrcanian forests. The present research based on objectives of REDD projects paid to identify of fore...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملCollaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS
In this paper, we present the design and implementation of a Collaborative Intrusion Detection System (CIDS) for accurate and efficient intrusion detection in a distributed system. CIDS employs multiple specialized detectors at the different layers – network, kernel and application – and a manager based framework for aggregating the alarms from the different detectors to provide a combined alar...
متن کاملInvestigating the problem of IDS false alarms: An experimental study using Snort
IDS can play a vital role in the overall security infrastructure, as one last defence against attacks after secure network architecture design, secure program design and firewalls [1]. Although IDS technology has become an essential part of corporate network architecture, the art of detecting intrusions is still far from perfect. A significant problem is that of false alarms, which correspond t...
متن کاملSoundness by Static Analysis and False-alarm Removal by Statistical Analysis: Our Airac Experience∗
We present our experience of combining, in a realistic setting, a static analysis for soundness and a statistical analysis for false-alarm removal. The static analyzer is Airac that we have developed in the abstract interpretation framework for detecting buffer overruns in ANSI + GNU C programs. Airac is sound (finding all bugs) but with false alarms. Airac raised, for example, 970 buffer-overr...
متن کامل