메뉴 건너뛰기




Volumn 50, Issue 1, 2010, Pages 21-31

A cost-based analysis of intrusion detection system configuration under active or passive response

Author keywords

IDS configuration; Information security; Intrusion response; Investigation capacity

Indexed keywords

CLOSED FORM; COST-BASED ANALYSIS; COSTS AND BENEFITS; IDS CONFIGURATION; INFORMATION ASSETS; INFORMATION FLOWS; INFORMATION SECURITY; INTRUSION DETECTION SYSTEMS; INTRUSION RESPONSE; INVESTIGATION CAPACITY; JOINT DECISIONS; NUMERICAL STUDIES; OPTIMAL CONFIGURATIONS; OPTIMAL DECISIONS; VARIOUS CONFIGURATION;

EID: 78049461565     PISSN: 01679236     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dss.2010.06.001     Document Type: Article
Times cited : (12)

References (27)
  • 1
    • 78049484171 scopus 로고    scopus 로고
    • Ernst and Young 2006 global information security survey: Achieving success in a globalized world, is yuor way secure?
    • "Ernst and Young 2006 global information security survey: Achieving success in a globalized world, is yuor way secure?" Ernst and Young" White Paper, 2006.
    • (2006) Ernst and Young White Paper
  • 3
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • S. Axelsson The base-rate fallacy and the difficulty of intrusion detection ACM Transactions on Information and System Security vol. 3 no. 3 2000 186 205
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 7
    • 34548502174 scopus 로고    scopus 로고
    • Configuration of detection software: A comparison of decision and game theory approaches
    • H. Cavusoglu, and S. Raghunathan Configuration of detection software: a comparison of decision and game theory approaches Decision Analysis 1 3 2004 131 148
    • (2004) Decision Analysis , vol.1 , Issue.3 , pp. 131-148
    • Cavusoglu, H.1    Raghunathan, S.2
  • 9
    • 33746449221 scopus 로고    scopus 로고
    • A decision analysis method for evaluating computer intrusion detection systems
    • J.E. Gaffney Jr., and J.W. Ulvila A decision analysis method for evaluating computer intrusion detection systems In Ecision Analysis 1 1 2004 35 50
    • (2004) Ecision Analysis , vol.1 , Issue.1 , pp. 35-50
    • Gaffney Jr., J.E.1    Ulvila, J.W.2
  • 11
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • W. Lee, and S.J. Stolfo A framework for constructing features and models for intrusion detection systems ACM Transactions on Information and System Security 3 4 2000 227 261
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 12
    • 0036093229 scopus 로고    scopus 로고
    • Toward cost-sensitive modeling for intrusion detection and response
    • W. Lee, W. Fan, M. Miller, S.J. Stolfo, and E. Zadok Toward cost-sensitive modeling for intrusion detection and response Journal of Computer Security 10 2002 5 22 (Pubitemid 34531411)
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 5-22
    • Lee, W.1    Fan, W.2    Miller, M.3    Stolfo, S.J.4    Zadok, E.5
  • 21
    • 36949004275 scopus 로고    scopus 로고
    • Software decoys for software counterintelligence
    • N.C. Rowe, J.B. Michael, M. Auguston, and R. Riehle Software decoys for software counterintelligence IAnewsletter 5 1 2002 10 12
    • (2002) IAnewsletter , vol.5 , Issue.1 , pp. 10-12
    • Rowe, N.C.1    Michael, J.B.2    Auguston, M.3    Riehle, R.4
  • 25
    • 33746449221 scopus 로고    scopus 로고
    • A decision analysis method for evaluating computer intrusion detection systems
    • J.W. Ulvila, and J.E. Gaffney Jr. A decision analysis method for evaluating computer intrusion detection systems Decision Analysis 1 1 2004 35 50
    • (2004) Decision Analysis , vol.1 , Issue.1 , pp. 35-50
    • Ulvila, J.W.1    Gaffney Jr., J.E.2
  • 27
    • 0036647172 scopus 로고    scopus 로고
    • Multivariate statistical analysis of audit trails for host-based intrusion detection
    • DOI 10.1109/TC.2002.1017701
    • Q.C.N. Ye, S.M. Emran, and S. Vilbert Multivariate statistical analysis of audit trails for host-based intrusion detection IEEE Transactions on Computers 51 7 2002 810 820 (Pubitemid 34835448)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.7 , pp. 810-820
    • Ye, N.1    Emran, S.M.2    Chen, Q.3    Vilbert, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.