Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis
Existing approaches to characterizing intrusion detection systems focus on performance under test conditions. While it is well-understood that operational conditions may differ from test conditions, little attention has been paid to the question of assessing the effect on IDS results of parameter es...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 278 |
---|---|
container_issue | |
container_start_page | 269 |
container_title | |
container_volume | |
creator | Cole, R.J. Peng Liu |
description | Existing approaches to characterizing intrusion detection systems focus on performance under test conditions. While it is well-understood that operational conditions may differ from test conditions, little attention has been paid to the question of assessing the effect on IDS results of parameter estimation errors resulting from these differences. In this paper we consider this question in the context of multi-step attacks. We derive simulated distributions of the posterior probability of exploit given the observation of a series of alerts and bounds on the posterior uncertainty given a particular distribution of the model parameters. Knowledge of such bounds introduces the novel prospect of a confidence versus agility tradeoff in IDS administration. Such a tradeoff could give administrators flexibility in IDS configuration, allowing them to choose detection confidence at the price of detection latency, according to organizational priorities. |
doi_str_mv | 10.1109/ACSAC.2008.14 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4721564</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4721564</ieee_id><sourcerecordid>4721564</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-bcf28420ac7f6fbc1475c25116666c4e86694266ec6cbcb2b630a69748fb58693</originalsourceid><addsrcrecordid>eNotjM1OAjEYRRt_EgFdunLTFyj268_X6XIYUUkwJiJLQzqlY2qwkGnR8PZK9G7O2ZxLyDXwMQC3t3WzqJux4LwagzohA6ENMgtcnpIhN2i1VMrIMzIAjpJZLcwFGeb8wTlYa2BA3ur1ug85x_RO59tvOnE50BdXQqYx0Vkq_T7HbaJ3oQRfjvYVHV0mH_riYioHNtnu0_qYP-03JbJFCTtaJ7c55JgvyXnnNjlc_XNElvfT1-aRzZ8fZk09ZxGMLqz1naiU4M6bDrvWgzLaCw2Av_MqVIhWCcTg0be-FS1K7tAaVXWtrtDKEbn5-40hhNWuj5-uP6yUEaBRyR-kPVQt</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Cole, R.J. ; Peng Liu</creator><creatorcontrib>Cole, R.J. ; Peng Liu</creatorcontrib><description>Existing approaches to characterizing intrusion detection systems focus on performance under test conditions. While it is well-understood that operational conditions may differ from test conditions, little attention has been paid to the question of assessing the effect on IDS results of parameter estimation errors resulting from these differences. In this paper we consider this question in the context of multi-step attacks. We derive simulated distributions of the posterior probability of exploit given the observation of a series of alerts and bounds on the posterior uncertainty given a particular distribution of the model parameters. Knowledge of such bounds introduces the novel prospect of a confidence versus agility tradeoff in IDS administration. Such a tradeoff could give administrators flexibility in IDS configuration, allowing them to choose detection confidence at the price of detection latency, according to organizational priorities.</description><identifier>ISSN: 1063-9527</identifier><identifier>ISBN: 0769534473</identifier><identifier>ISBN: 9780769534473</identifier><identifier>EISSN: 2576-9103</identifier><identifier>DOI: 10.1109/ACSAC.2008.14</identifier><language>eng</language><publisher>IEEE</publisher><subject>Application software ; Bayesian methods ; Bayesian network ; Computer security ; Expert systems ; Information analysis ; Intrusion detection ; Performance analysis ; Phase detection ; Probabilistic inference ; System testing ; Uncertainty</subject><ispartof>2008 Annual Computer Security Applications Conference (ACSAC), 2008, p.269-278</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4721564$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4721564$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Cole, R.J.</creatorcontrib><creatorcontrib>Peng Liu</creatorcontrib><title>Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis</title><title>2008 Annual Computer Security Applications Conference (ACSAC)</title><addtitle>ACSAC</addtitle><description>Existing approaches to characterizing intrusion detection systems focus on performance under test conditions. While it is well-understood that operational conditions may differ from test conditions, little attention has been paid to the question of assessing the effect on IDS results of parameter estimation errors resulting from these differences. In this paper we consider this question in the context of multi-step attacks. We derive simulated distributions of the posterior probability of exploit given the observation of a series of alerts and bounds on the posterior uncertainty given a particular distribution of the model parameters. Knowledge of such bounds introduces the novel prospect of a confidence versus agility tradeoff in IDS administration. Such a tradeoff could give administrators flexibility in IDS configuration, allowing them to choose detection confidence at the price of detection latency, according to organizational priorities.</description><subject>Application software</subject><subject>Bayesian methods</subject><subject>Bayesian network</subject><subject>Computer security</subject><subject>Expert systems</subject><subject>Information analysis</subject><subject>Intrusion detection</subject><subject>Performance analysis</subject><subject>Phase detection</subject><subject>Probabilistic inference</subject><subject>System testing</subject><subject>Uncertainty</subject><issn>1063-9527</issn><issn>2576-9103</issn><isbn>0769534473</isbn><isbn>9780769534473</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjM1OAjEYRRt_EgFdunLTFyj268_X6XIYUUkwJiJLQzqlY2qwkGnR8PZK9G7O2ZxLyDXwMQC3t3WzqJux4LwagzohA6ENMgtcnpIhN2i1VMrIMzIAjpJZLcwFGeb8wTlYa2BA3ur1ug85x_RO59tvOnE50BdXQqYx0Vkq_T7HbaJ3oQRfjvYVHV0mH_riYioHNtnu0_qYP-03JbJFCTtaJ7c55JgvyXnnNjlc_XNElvfT1-aRzZ8fZk09ZxGMLqz1naiU4M6bDrvWgzLaCw2Av_MqVIhWCcTg0be-FS1K7tAaVXWtrtDKEbn5-40hhNWuj5-uP6yUEaBRyR-kPVQt</recordid><startdate>200812</startdate><enddate>200812</enddate><creator>Cole, R.J.</creator><creator>Peng Liu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200812</creationdate><title>Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis</title><author>Cole, R.J. ; Peng Liu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-bcf28420ac7f6fbc1475c25116666c4e86694266ec6cbcb2b630a69748fb58693</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Application software</topic><topic>Bayesian methods</topic><topic>Bayesian network</topic><topic>Computer security</topic><topic>Expert systems</topic><topic>Information analysis</topic><topic>Intrusion detection</topic><topic>Performance analysis</topic><topic>Phase detection</topic><topic>Probabilistic inference</topic><topic>System testing</topic><topic>Uncertainty</topic><toplevel>online_resources</toplevel><creatorcontrib>Cole, R.J.</creatorcontrib><creatorcontrib>Peng Liu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Cole, R.J.</au><au>Peng Liu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis</atitle><btitle>2008 Annual Computer Security Applications Conference (ACSAC)</btitle><stitle>ACSAC</stitle><date>2008-12</date><risdate>2008</risdate><spage>269</spage><epage>278</epage><pages>269-278</pages><issn>1063-9527</issn><eissn>2576-9103</eissn><isbn>0769534473</isbn><isbn>9780769534473</isbn><abstract>Existing approaches to characterizing intrusion detection systems focus on performance under test conditions. While it is well-understood that operational conditions may differ from test conditions, little attention has been paid to the question of assessing the effect on IDS results of parameter estimation errors resulting from these differences. In this paper we consider this question in the context of multi-step attacks. We derive simulated distributions of the posterior probability of exploit given the observation of a series of alerts and bounds on the posterior uncertainty given a particular distribution of the model parameters. Knowledge of such bounds introduces the novel prospect of a confidence versus agility tradeoff in IDS administration. Such a tradeoff could give administrators flexibility in IDS configuration, allowing them to choose detection confidence at the price of detection latency, according to organizational priorities.</abstract><pub>IEEE</pub><doi>10.1109/ACSAC.2008.14</doi><tpages>10</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1063-9527 |
ispartof | 2008 Annual Computer Security Applications Conference (ACSAC), 2008, p.269-278 |
issn | 1063-9527 2576-9103 |
language | eng |
recordid | cdi_ieee_primary_4721564 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Application software Bayesian methods Bayesian network Computer security Expert systems Information analysis Intrusion detection Performance analysis Phase detection Probabilistic inference System testing Uncertainty |
title | Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-14T12%3A38%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Addressing%20Low%20Base%20Rates%20in%20Intrusion%20Detection%20via%20Uncertainty-Bounding%20Multi-Step%20Analysis&rft.btitle=2008%20Annual%20Computer%20Security%20Applications%20Conference%20(ACSAC)&rft.au=Cole,%20R.J.&rft.date=2008-12&rft.spage=269&rft.epage=278&rft.pages=269-278&rft.issn=1063-9527&rft.eissn=2576-9103&rft.isbn=0769534473&rft.isbn_list=9780769534473&rft_id=info:doi/10.1109/ACSAC.2008.14&rft_dat=%3Cieee_6IE%3E4721564%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4721564&rfr_iscdi=true |