Evaluation of intrusion detectors: A decision theory approach

被引:47
作者
Gaffney, JE [1 ]
Ulvila, JW [1 ]
机构
[1] Lockheed Martin Corp, Bethesda, MD 20817 USA
来源
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS | 2001年
关键词
D O I
10.1109/SECPRI.2001.924287
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a method of analysis fbr evaluating intrusion detection systems. The method can be used to compare the performance of intrusion detectors, to evaluate performance goals for intrusion detectors, and to determine the best configuration of an intrusion detector for a given environment. The method uses a decision analysis that integrates and extends ROC (receiver operating characteristics) and cost analysis methods to provide an expected cost metric. We provide general results and illustrate the method in several numerical examples that cover a range of detectors that meet a performance goal and two actual detectors operating in a realistic environment. We demonstrate that, contrary to common advice. the value of an intrusion detection system and the optimal operation of that system depend not only on the system's ROC curve, but also on cost metrics and the hostility of the operating environment as summarized by the probability of intrusion. Extensions of the method are outlined and conclusions are drawn.
引用
收藏
页码:50 / 61
页数:12
相关论文
共 17 条
[1]  
[Anonymous], 1985, MODERN DECISION MAKI
[2]  
[Anonymous], 1977, Applied mathematical programming
[3]  
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[4]  
DeGroot M., 1970, OPTIMAL STAT DECISIO
[5]   The NIST speaker recognition evaluation - Overview, methodology, systems, results, perspective [J].
Doddington, GR ;
Przybocki, MA ;
Martin, AF ;
Reynolds, DA .
SPEECH COMMUNICATION, 2000, 31 (2-3) :225-254
[6]   Testing and evaluating computer intrusion detection systems [J].
Durst, R ;
Champion, T ;
Witten, B ;
Miller, E ;
Spagnuolo, L .
COMMUNICATIONS OF THE ACM, 1999, 42 (07) :53-61
[7]  
GAFFNEY J, 2000, 001 DEC SCI ASS INC
[8]  
GRAF I, 1998, DARPA PI M 15 DEC
[9]  
Hancock J. C., 1966, SIGNAL DETECTION THE
[10]  
Keeney R.L., 1976, DECISIONS MULTIPLE O