Proceedings of the 2014 Symposium and Bootcamp on the Science of Security 2014
DOI: 10.1145/2600176.2600197
|View full text |Cite
|
Sign up to set email alerts
|

Preemptive intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…To address the limitations of previous efforts, we use Factor Graphs, a type of probabilistic graphical model that unifies BNs and MRFs [8,4]. Unlike signature and anomaly techniques, Factor Graphs do not rely on a single rule or an anomaly measure.…”
Section: Related Workmentioning
confidence: 99%
“…To address the limitations of previous efforts, we use Factor Graphs, a type of probabilistic graphical model that unifies BNs and MRFs [8,4]. Unlike signature and anomaly techniques, Factor Graphs do not rely on a single rule or an anomaly measure.…”
Section: Related Workmentioning
confidence: 99%
“…However, the only way to control the distribution Pr : Θ → [0, 1] of the trust profiles of a population of systems to which S belongs is to model this population in the experimental environment of a laboratory, where I could control that the sample is distributed according to Pr : Θ → [0, 1]. Sampling the behaviors of the system S in this controlled environment would then allow me to calculate Pr(θ|x) according to (7) for all profiles θ ∈ Θ, and to select the most likely profile θ = 0 ∈ Θ as my current trust hypothesis about S. But even this experimental environment, where I can impose the prior probability Pr : Θ → [0, 1] by controlling the sample, does not give me the prior probabilities Pr θ : B → [0, 1], which express the trust hypotheses to be tested. Where do they come from?…”
Section: Experimental Testing Of Trustmentioning
confidence: 99%
“…It is much easier to characterize each of the abnormal behaviors, which we learn from the anomalies experienced in the past. That is why the statistical intrusion detection systems [10,24,7] and forensics mostly work with the statistical profiles of intruders and criminals, and test these profiles as the null hypotheses.…”
Section: The Scientific Presumption Of Innocencementioning
confidence: 99%
See 1 more Smart Citation