2014
DOI: 10.4236/jis.2014.52003
|View full text |Cite
|
Sign up to set email alerts
|

False Positive Responses Optimization for Intrusion Detection System

Abstract: In Intrusion Detection Systems (IDS), the operation costs represent one of the big challenges for researchers. They are apart from the IDS cost acquisition and they comprise the costs of maintenance, administration, response, running and errors reactions costs. In the present paper, we focus on the missed reactions which include False Positive (FP) and False Negative (FN) reactions. For that a new optimization cost model is proposed for IDS. This optimization proposes a minimal interval where the IDSs work opt… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…The literature does show that systems have flaws and that those very systems are hard to replace, ineffective, and vulnerable to increasing and sophisticated attacks from outside and especially inside [53]. IDS need to be adequately configured to perform as expected [13]. However, it does not mean that the security monitoring stops there.…”
Section: Ethical Behaviormentioning
confidence: 99%
See 1 more Smart Citation
“…The literature does show that systems have flaws and that those very systems are hard to replace, ineffective, and vulnerable to increasing and sophisticated attacks from outside and especially inside [53]. IDS need to be adequately configured to perform as expected [13]. However, it does not mean that the security monitoring stops there.…”
Section: Ethical Behaviormentioning
confidence: 99%
“…It is also fundamental to keep in mind that the human element is a factor where system administrators need to analyze and improve practices to enhance IDS [68]. There is a great deal of opportunity to handle all the big challenges when it comes to better system definition and all associations to implement the right controls [13]. Some systems do currently use a static corresponding matching to decide what is best to deal with current penetration attempts [65].…”
Section: Secured System Developmentmentioning
confidence: 99%