Evaluation of intrusion detection systems under a resource constraint

被引:10
作者
Ryu, Young U. [1 ]
Rhee, Hyeun-Suk [1 ]
机构
[1] Univ Texas Dallas, Dallas, TX 75230 USA
关键词
security; performance; computer security; intrusion detection; optimal inspection rates; optimal operating points;
D O I
10.1145/1380564.1380566
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An intrusion detection system plays an important role in a firm's overall security protection. Its main purpose is to identify potentially intrusive events and alert the security personnel to the danger. A typical intrusion detection system, however, is known to be imperfect in detection of intrusive events, resulting in high false-alarm rates. Nevertheless, current intrusion detection models unreasonably assume that upon alerts raised by a system, an information security officer responds to all alarms without any delay and avoids damages of hostile activities. This assumption of responding to all alarms with no time lag is often impracticable. As a result, the benefit of an intrusion detection system can be overestimated by current intrusion detection models. In this article, we extend previous models by including an information security officer's alarm inspection under a constraint as a part of the process in determining the optimal intrusion detection policy. Given a potentially hostile environment for a firm, in which the intrusion rates and costs associated with intrusion and security officers' inspection can be estimated, we outline a framework to establish the optimal operating points for intrusion detection systems under security officers' inspection constraint. The optimal solution to the model will provide not only a basis of better evaluation of intrusion detection systems but also useful insights into operations of intrusion detection systems. The firm can estimate expected benefits for running intrusion detection systems and establish a basis for increase in security personnel to relax security officers' inspection constraint.
引用
收藏
页数:24
相关论文
共 22 条
[1]  
[Anonymous], 2004, INTRUSION DETECTION
[2]  
[Anonymous], J COMPUTER SECURITY
[3]  
[Anonymous], 2001, P 17 ANN COMP SEC AP
[4]  
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[5]  
CARDENAS AA, 2003, 200347 MAR U DEP EL
[6]  
Cavusoglu H., 2004, Decis. Anal., V1, P131
[7]   Testing and evaluating computer intrusion detection systems [J].
Durst, R ;
Champion, T ;
Witten, B ;
Miller, E ;
Spagnuolo, L .
COMMUNICATIONS OF THE ACM, 1999, 42 (07) :53-61
[8]   Evaluation of intrusion detectors: A decision theory approach [J].
Gaffney, JE ;
Ulvila, JW .
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, :50-61
[9]  
KEMMERER RA, 2002, SECURITY PRIVACY SUP, P27
[10]   On the trail of intrusions into information systems [J].
Kent, S .
IEEE SPECTRUM, 2000, 37 (12) :52-+