2015
DOI: 10.1016/j.cose.2015.07.005
|View full text |Cite
|
Sign up to set email alerts
|

A three-stage analysis of IDS for critical infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…• Remote-to-user attacks (R2L) Twoimportant metrics were used to evaluate the performance of our MAS-DIDS proposal: detection rate (DR) and false positive rate (FPR). DR refers to the number of true attacks detected within these detections [28], defined by: 𝐷𝑅 = 𝑇𝑃 𝑇𝑃 + 𝐹𝑁 (2) FPR refers to the number of instances falsely detected as attacks within all these detections [29], defined by: 𝐹𝑃𝑅 = 𝐹𝑃 𝑇𝑁+𝐹𝑃 (3) where FP represents false positives, TP true positives and FN false negative. We can say that an IDS model is effective and realistic if it achieves a high DR and a low FPR.…”
Section: Resultsmentioning
confidence: 99%
“…• Remote-to-user attacks (R2L) Twoimportant metrics were used to evaluate the performance of our MAS-DIDS proposal: detection rate (DR) and false positive rate (FPR). DR refers to the number of true attacks detected within these detections [28], defined by: 𝐷𝑅 = 𝑇𝑃 𝑇𝑃 + 𝐹𝑁 (2) FPR refers to the number of instances falsely detected as attacks within all these detections [29], defined by: 𝐹𝑃𝑅 = 𝐹𝑃 𝑇𝑁+𝐹𝑃 (3) where FP represents false positives, TP true positives and FN false negative. We can say that an IDS model is effective and realistic if it achieves a high DR and a low FPR.…”
Section: Resultsmentioning
confidence: 99%
“…Thus, an IDSS can become vulnerable to cyberattacks. Consequently, the scientific community, companies, practitioners, and governments worldwide are searching for solutions to mitigate risks [29]. Hayes and Cappa [30] introduced open source intelligence (OSINT) to provide tactical and strategic recommendations for organizations to prevent cyberattacks by identifying vulnerabilities, mitigating risks, and formulating robust security policies.…”
Section: Intelligent Decision Support Systemsmentioning
confidence: 99%
“…A wide range of IDSes have been proposed for cyber-physical environments [24]. However, the greater majority of them are designed for specific classes of attacks without exploring possible intelligent capacities to detect multiple attack patterns of covert channel with variable capacities to modify their attack vectors in real time [24]. In the case of data exfiltration, attackers may, for example, customize their attack vectors to optimize modus operandi and simplify their activity traces.…”
Section: Practical Validation Based On It-ot Networkmentioning
confidence: 99%