DOI QR코드

DOI QR Code

The network model for Detection Systems based on data mining and the false errors

  • Lee Se-Yul (Department of Computer Science, Chungwoon University) ;
  • Kim Yong-Soo (Department of Computer Engineering, Daejeon University)
  • 발행 : 2006.06.01

초록

This paper investigates the asymmetric costs of false errors to enhance the detection systems performance. The proposed method utilizes the network model to consider the cost ratio of false errors. By comparing false positive errors with false negative errors this scheme achieved better performance on the view point of both security and system performance objectives. The results of our empirical experiment show that the network model provides high accuracy in detection. In addition, the simulation results show that effectiveness of probe detection is enhanced by considering the costs of false errors.

키워드

참고문헌

  1. Lee, W., Stolfo, S. J., 'A data mining framework for building intrusion detection models,' IEEE Symposium on Security and Privacy, pp. 209-220, 1999
  2. Safavi-Naini, R., Balachadran, B., 'Case-based reasoning for intrusion detection,' 12th Annual Computer Security Application Conference, pp. 214-223, 1996
  3. Denning, D. E., 'An intrusion detection model,' IEEE Trans. S. E., SE-13(2), pp. 222-232, 1987 https://doi.org/10.1109/TSE.1987.232894
  4. Richards, K., 'Network based intrusion detection: a review of technologies,' Computer and Security, pp. 671-682, 1999
  5. Debar, H., Dacier, M., 'Towards a taxonomy of intrusion detection systems,' Computer Networks, pp. 805-822, 1989
  6. Debar, H., Becker, M., 'A neural network component for an intrusion detection system,' IEEE Computer Society Symposium Research in Security and Privacy, pp. 240-250, 1992
  7. Weber, R., 'Information Systems Control and Audit,' IEEE Symposium on Security and Privacy, pp. 120-128, 1999
  8. Lippmann, R. P., 'Improving intrusion detection performance using keyword selection and neural networks,' Computer Networks, Vol. 24, pp. 597-603, 2000
  9. Jasper, R. J., Huang, M. Y., 'A large scale distributed intrusion detection framework based on attack strategy analysis,' Computer Networks, Vol. 31, pp. 2465-2475, 1999 https://doi.org/10.1016/S1389-1286(99)00114-0
  10. Ilgun, K., Kemmerer, R. A., 'Ustat: a real time intrusion system for UNIX,' Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 16-28, 1993
  11. Hubbards, B., Haley, T., McAuliffe, L., Schaefer, L., Kelem, N., Walcott, D., Feiertag, R., Schaefer, M., 'Computer system intrusion detection,' Computer Networks, pp. 120-128, 1990
  12. Vaccaro, H. S., 'Detection of anomalous computer session activity,' Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 280-289, 1989
  13. Helman, P., 'Statistical foundations of audit trail analysis for the detection of computer misuse,' IEEE Transactions on software engineering, Vol. 19, pp. 861-901, 1993
  14. Lee, S. Y. and Kim, Y. S., 'Design and analysis of probe detection systems for TCP networks,' International Journal of Advanced Computational Intelligence & Intelligent Informatics, Vol. 8, pp. 369-372, 2004 https://doi.org/10.20965/jaciii.2004.p0369
  15. Lee, S. Y., An Adaptive probe detection model using fuzzy cognitive maps, Ph. D. Dissertation, Daejeon University, 2003
  16. Maxion, R. A., 'Masquerade detection truncated command lines,' International Conference on Dependable Systems and Networks, pp. 219-228, 2002