Foundations of intrusion detection (computer security)

  • Helman P
  • Liepins G
  • Richards W
N/ACitations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Computer use is modeled as a mixture of two stochastic processes, normal and misuse. Intrusion detection is formally defined as identifying those transactions generated by the misuse process. Bounds for detection performance are derived in terms of the ratios of the densities of the processes at the individual transactions. It is shown that any optimal intrusion detection system must rank transaction suspicion consistently with these ratios. Sparsity of data requires that transactions be grouped into equivalence classes that preserve the order of the true ratio ranking and reduce the number of singleton and unobserved transactions. Results are described that demonstrate that in general this `singleton reduction' problem is NP-hard

Cite

CITATION STYLE

APA

Helman, P., Liepins, G., & Richards, W. (2003). Foundations of intrusion detection (computer security) (pp. 114–120). Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/csfw.1992.236783

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free