메뉴 건너뛰기




Volumn 3, Issue 3, 2000, Pages 186-205

The Base-Rate Fallacy and the Difficulty of Intrusion Detection

Author keywords

Base rate fallacy; detection rate; false alarm rate; intrusion detection; Performance; Security; Theory

Indexed keywords


EID: 84928016636     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/357830.357849     Document Type: Article
Times cited : (497)

References (22)
  • 1
    • 4444324359 scopus 로고    scopus 로고
    • An approach to UNIX security logging
    • In Proceedings of the 21st NIST-NCSC National Conference on Information Systems Security (Crystal City, Arlington, VA, Oct. 5-8). National Institute of Standards and Technology, Gaithersburg, MD
    • Axelsson, S., Lindqvist, U., Gustafson, U., and Jonsson, E. 1998. An approach to UNIX security logging. In Proceedings of the 21st NIST-NCSC National Conference on Information Systems Security (Crystal City, Arlington, VA, Oct. 5-8). National Institute of Standards and Technology, Gaithersburg, MD, 62-75
    • (1998) , pp. 62-75
    • Axelsson, S.1    Lindqvist, U.2    Gustafson, U.3    Jonsson, E.4
  • 2
    • 0007243881 scopus 로고
    • Auditory and other sensory forms of information
    • Navy, Air Force, H. Van Cott and R. Kinkade, Eds
    • Deatherage, B. H. 1972. Auditory and other sensory forms of information. In Human Engineering Guide to Equipment Design: Army, Navy, Air Force, H. Van Cott and R. Kinkade, Eds
    • (1972) Human Engineering Guide to Equipment Design: Army
    • Deatherage, B.H.1
  • 4
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • (Feb.)
    • Denning, D.E. 1987. An intrusion-detection model. IEEE Trans. Softw. Eng. SE-13, 2 (Feb.), 222-232
    • (1987) IEEE Trans. Softw. Eng. , vol.SE-13 , pp. 222-232
    • Denning, D.E.1
  • 6
    • 85024248175 scopus 로고
    • Building a security monitor with adaptive user work profiles
    • In Proceedings of the 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD
    • Halme, L. and Kahn, B. 1988. Building a security monitor with adaptive user work profiles. In Proceedings of the 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD.
    • (1988)
    • Halme, L.1    Kahn, B.2
  • 7
    • 0027668428 scopus 로고
    • Statistical foundations of audit trail analysis for the detection of computer misuse
    • (Sept.)
    • Helman, P. and Liepins, G. 1993. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Trans. Softw. Eng. 19, 9 (Sept.), 886-901
    • (1993) IEEE Trans. Softw. Eng. , vol.19 , pp. 886-901
    • Helman, P.1    Liepins, G.2
  • 8
    • 77949731575 scopus 로고    scopus 로고
    • Temporal sequence learning and data reduction for anomaly detection
    • Lane, T. and Brodley, C. E. 1999. Temporal sequence learning and data reduction for anomaly detection. ACM Trans. Inf. Syst. Secur. 2, 3, 295-331
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.3 , pp. 295-331
    • Lane, T.1    Brodley, C.E.2
  • 9
    • 84940104123 scopus 로고    scopus 로고
    • A data mining framework for building intrusion detection models
    • In Proceedings of the 1999 IEEE Computer Society Symposium on Research in Security and Privacy (Berkeley, CA, May). IEEE Computer Society Press, Los Alamitos, CA
    • Lee, W. 1999. A data mining framework for building intrusion detection models. In Proceedings of the 1999 IEEE Computer Society Symposium on Research in Security and Privacy (Berkeley, CA, May). IEEE Computer Society Press, Los Alamitos, CA, 120-132
    • (1999) , pp. 120-132
    • Lee, W.1
  • 10
    • 84962260018 scopus 로고    scopus 로고
    • Evaluating intrusion detection systems: The DARPA off-line intrusion detection evaluation
    • (DISCEX '00, Hilton Head, South Carolina, Jan. 25-27). IEEE Computer Society Press, Los Alamitos, CA
    • Lippmann, R. P., Fried, D., Graf, I., et al. 2000. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX '00, Hilton Head, South Carolina, Jan. 25-27). IEEE Computer Society Press, Los Alamitos, CA, 12-26
    • (2000) Proceedings of the DARPA Information Survivability Conference and Exposition , pp. 12-26
    • Lippmann, R.P.1    Fried, D.2    Graf, I.3
  • 11
    • 0003111439 scopus 로고
    • Automated audit trail analysis and intrusion detection
    • In Proceedings of the on 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD
    • Lunt, T. F. 1988. Automated audit trail analysis and intrusion detection. In Proceedings of the on 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD, 65-73
    • (1988) , pp. 65-73
    • Lunt, T.F.1
  • 12
    • 85024291104 scopus 로고    scopus 로고
    • Base-rate errors and rain forecasts
    • Matthews, R. 1996. Base-rate errors and rain forecasts. Nature 382, 6594-6766
    • (1996) Nature , vol.382 , pp. 6594-6766
    • Matthews, R.1
  • 13
    • 0031430904 scopus 로고    scopus 로고
    • Decision-theoretic limits on earthquake prediction
    • (Dec.)
    • Matthews, R. 1997. Decision-theoretic limits on earthquake prediction. Geophys. J. Int. 131, 3 (Dec.), 526-529
    • (1997) Geophys. J. Int. , vol.131 , pp. 526-529
    • Matthews, R.1
  • 14
    • 0003700691 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 Lincoln Laboratory evaluations
    • Mchugh, J. 2000. Testing intrusion detection systems: A critique of the 1998 and 1999 Lincoln Laboratory evaluations. ACM Trans. Inf. Syst. Secur. 3
    • (2000) ACM Trans. Inf. Syst. Secur , pp. 3
    • Mchugh, J.1
  • 15
    • 85024284090 scopus 로고
    • incendiaries and sabotage: Field training manual, Fleet Marine Force, US Marine Corps
    • Pierce, G. M. 1943. Destruction by demolition, incendiaries and sabotage: Field training manual, Fleet Marine Force, US Marine Corps
    • (1943) Destruction by demolition
    • Pierce, G.M.1
  • 16
    • 84877340108 scopus 로고
    • Information Processing and Human-Machine Interaction: An Approach to Cognitive Engineering
    • Co.
    • Rasmussen, J. 1986. Information Processing and Human-Machine Interaction: An Approach to Cognitive Engineering. North-Holland Publishing Co., Amsterdam, The Netherlands
    • (1986) North-Holland Publishing
    • Rasmussen, J.1
  • 18
    • 2942645420 scopus 로고
    • Expert systems in intrusion detection: A case study
    • In Proceedings of the 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD
    • Sebring, M. M., Shellhouse, E., Hanna, M. E., and Whitehurst, R. A. 1988. Expert systems in intrusion detection: A case study. In Proceedings of the 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD, 74-81
    • (1988) , pp. 74-81
    • Sebring, M.M.1    Shellhouse, E.2    Hanna, M.E.3    Whitehurst, R.A.4
  • 19
    • 0003462953 scopus 로고
    • Detection, Estimation, and Modulation Theory, Part I: Detection, Estimation, and Linear Modulation Theory
    • John Wiley and Sons, Inc., New York, NY
    • Trees, H. L. V. 1968. Detection, Estimation, and Modulation Theory, Part I: Detection, Estimation, and Linear Modulation Theory. John Wiley and Sons, Inc., New York, NY
    • (1968)
    • Trees, H.L.V.1
  • 20
    • 0024665277 scopus 로고
    • Detection of anomalous computer session activity
    • In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA, May 1-3). IEEE Computer Society Press, Los Alamitos, CA
    • Vaccaro, H. S. and Liepins, G. E. 1989. Detection of anomalous computer session activity. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA, May 1-3). IEEE Computer Society Press, Los Alamitos, CA, 280-289
    • (1989) , pp. 280-289
    • Vaccaro, H.S.1    Liepins, G.E.2
  • 21
    • 84880174811 scopus 로고    scopus 로고
    • Detecting intrusions using system calls: Alternative data models
    • In Proceedings of the 1999 IEEE Computer Society Symposium on Research in Security and Privacy (Berkeley, CA, May). IEEE Computer Society Press, Los Alamitos, CA
    • Warrender, C., Forrest, S., and Perlmutter, B. 1999. Detecting intrusions using system calls: Alternative data models. In Proceedings of the 1999 IEEE Computer Society Symposium on Research in Security and Privacy (Berkeley, CA, May). IEEE Computer Society Press, Los Alamitos, CA, 133-145
    • (1999) , pp. 133-145
    • Warrender, C.1    Forrest, S.2    Perlmutter, B.3
  • 22
    • 0003636986 scopus 로고
    • Engineering Psychology and Human Performance
    • 2nd ed. HarperCollins Publishers, New York, NY
    • Wickens, C. 1992. Engineering Psychology and Human Performance. 2nd ed. HarperCollins Publishers, New York, NY
    • (1992)
    • Wickens, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.