Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/6923
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ögüt, Hulisi | - |
dc.contributor.author | Çavuşoğlu, Hüseyin | - |
dc.contributor.author | Raghunathan, Şrinivaşan | - |
dc.date.accessioned | 2021-09-11T15:44:18Z | - |
dc.date.available | 2021-09-11T15:44:18Z | - |
dc.date.issued | 2008 | en_US |
dc.identifier.citation | Workshop on Informational Technology and Systems (WITS 2003) -- 2003 -- Seattle, WA | en_US |
dc.identifier.issn | 1091-9856 | - |
dc.identifier.issn | 1526-5528 | - |
dc.identifier.uri | https://doi.org/10.1287/ijoc.1070.0222 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/6923 | - |
dc.description.abstract | Intrusion-detection systems (IDSs) form an important component of IT security architectures, but the low proportion of hackers in the user population severely limits the usefulness of IDSs. Thus, even when the IDS is good, an intrusion signal may not imply that the user is more likely to be a hacker than a normal user. Ignoring the low base rate for the proportion of hackers results in acting on every intrusion signal, which is costly because of the high rate of false alarms. This problem is known as the base-rate fallacy in IDSs. On the other hand, ignoring intrusion signals renders IDSs useless. We propose and analyze waiting-time policies, which specify a response to signals from IDSs. We formulate the problem as a stochastic dynamic programming model and derive the optimal waiting time before acting upon an intrusion signal. Because the optimal policy is difficult to implement in many situations, we also derive and theoretically analyze a myopic policy. Our simulations suggest that the behavior of the myopic policy is qualitatively similar to that of the optimal policy. Further, the myopic policy performs better than other policies often used in practice, such as the Bayes policy and m-strike policies. The myopic policy can be implemented easily in a decision support system that supplements an IDS to mitigate the base-rate fallacy and to improve the value of the IDS. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Informs | en_US |
dc.relation.ispartof | Informs Journal On Computing | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | IT security | en_US |
dc.subject | dynamic programming | en_US |
dc.subject | stochastic model applications | en_US |
dc.subject | decision analysis | en_US |
dc.title | Intrusion-Detection Policies for It Security Breaches | en_US |
dc.type | Conference Object | en_US |
dc.department | Faculties, Faculty of Economics and Administrative Sciences, Department of Management | en_US |
dc.department | Fakülteler, İktisadi ve İdari Bilimler Fakültesi, İşletme Bölümü | tr_TR |
dc.identifier.volume | 20 | en_US |
dc.identifier.issue | 1 | en_US |
dc.identifier.startpage | 112 | en_US |
dc.identifier.endpage | 123 | en_US |
dc.authorid | 0000-0002-7982-3602 | - |
dc.identifier.wos | WOS:000254140400011 | en_US |
dc.identifier.scopus | 2-s2.0-61349169100 | en_US |
dc.institutionauthor | Öğüt, Hulusi | - |
dc.identifier.doi | 10.1287/ijoc.1070.0222 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.relation.conference | Workshop on Informational Technology and Systems (WITS 2003) | en_US |
dc.identifier.scopusquality | Q1 | - |
item.openairetype | Conference Object | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
Appears in Collections: | İşletme Bölümü / Department of Management Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
13
checked on Dec 21, 2024
WEB OF SCIENCETM
Citations
10
checked on Oct 5, 2024
Page view(s)
94
checked on Dec 23, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.