期刊文献+

多入侵检测系统与人工调查组合的安全技术管理策略 被引量:2

Security technology management strategy of multi-intrusion detection systems and manual investigation portfolio
下载PDF
导出
摘要 为了实现对信息系统安全的纵深防御,从经济管理角度出发,将多个IDS和人工调查技术相组合,利用博弈论研究了其最优配置与策略.研究结果显示,组织部署多个IDS可从一定程度上提高整体入侵检测率,从而减少入侵,降低组织人工调查率.但随着入侵检测率的提高,系统误报率也得到提高,这必然导致人工调查成本增加,从而影响组织期望收益,因此部署多个IDS时的期望收益并不总是高于部署单个IDS.当人工调查成本小于等于1时,检测率提高程度倒数与误报率提高程度倒数之差小于0则部署多个IDS时期望收益较大;当人工调查成本大于1且较高时,同时取决于上述倒数差和另一个因子,两者保持异号时则部署多个IDS时期望收益较大. In order to defend an organization's information system in depth, the optimal configura- tions and strategy of several intrusion detection systems (IDSs) and manual investigation portfolio are studied with the game-theoretic method from the perspective of economics and management. The results show that when the organization deploys several IDSs together with manual investigation, the whole intrusion detection rate is improved at some degree, and intrusions and manual investigations are decreased. Though the detection rate is improved, the false positive rate is also increased, which results in higher costs of manual investigation and the decrease in the expected payoff for the organi- zation. Therefore, the payoff for the organization to deploy several IDSs is not always higher than that to deploy single one. When the cost of a manual investigation is below or equal to 1 and the difference between the reciprocal of detection rate improvement and that of false rate improvement is negative, the payoff of deploying several IDSs is higher than that of deploying single one. When the cost of manual investigation is above 1 and high enough, the payoff of deploying several IDSs de- pends on both the difference above and the other factor, and it is higher when both of the two factors are kept in opposite sign.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2015年第4期811-816,共6页 Journal of Southeast University:Natural Science Edition
基金 国家自然科学基金资助项目(71071033) 江苏省普通高校研究生科研创新计划资助项目(CXLX13_124)
关键词 信息系统安全 纵深防御 入侵检测系统 人工调查 检测率 information system security defend in depth intrusion detection system manual inves-tigation detection rate
  • 相关文献

参考文献16

  • 1Liao H J, Lin C H R, Lin Y C, et al. Intrusion detec- tion system: a comprehensive review I J ]- Journal of Network & Computer Applications, 2013, 36( 1 ) : 16 - 24. 被引量:1
  • 2Xenakis C, Panos C, Stavrakakis I. A comparative evaluation of intrusion detection architectures for mobile ad hoc networks[ J]. Computers & Security, 2011, 30 (1) : 63 -80. 被引量:1
  • 3Farooqi A H, Khan F A, Wang J, et al. A novel intru- sion detection framework for wireless sensor networks [J]. Personal and Ubiquitous Computing, 2013, 17 (5) : 907 -919. 被引量:1
  • 4Modi C, Patel D, Bofisaniya B, et al. A survey of intru- sion detection techniques in Cloud [J]- Journal of Net- work and Computer Applications, 2013, 36( 1 ) : 42 -57. 被引量:1
  • 5Wu S X, Banzhaf W. The use of computational intelli- gence in intrusion detection systems: a review [ J ]. Ap- plied Soft Computing, 2010, 10( 1 ) : 1 -35. 被引量:1
  • 6Cavusoglu H, Mishra B, Raghunathan S. The value of intrusion detection systems information technology secu- rity architecture [J]. Information Systems Research, 2005, 16 ( 1 ) : 28 - 46. 被引量:1
  • 7李天目,仲伟俊,梅姝娥.入侵防御系统管理和配置的检查博弈分析[J].系统工程学报,2008,23(5):589-595. 被引量:5
  • 8Liu S, Zhang D Y, Chu X, et al. A game theoretic ap- proach to optinaize the performance of host-based IDS C ]//IEEE International Conference on Wireless & Mobile Computing, Networking & Communication. Avignon, France, 2008:448-453. 被引量:1
  • 9Chen L, Leneutre J. A game theoretical framework on intrusion detection in heterogeneous networks [J]. 1EEE Transactions on Information Forensics and Security, 2009, 4(2) : 165 - 178. 被引量:1
  • 10Elshoush H T, Osman I M. Alert correlation in collab- orative intelligent intrusion detection systems--a survey [J]. Applied Soft Computing, 2011, 11(7) : 4349 - 4365. 被引量:1

二级参考文献39

  • 1郭渊博,马建峰.基于博弈论框架的自适应网络入侵检测与响应[J].系统工程与电子技术,2005,27(5):914-917. 被引量:9
  • 2王卫平,朱卫未.基于不完全信息动态博弈的入侵检测模型[J].小型微型计算机系统,2006,27(2):253-256. 被引量:4
  • 3徐南荣 仲伟俊.科学决策理论与方法[M].南京:东南大学出版社,1996.2-10. 被引量:21
  • 4Bace R, Mell P. Special Publication on Intrusion Detection System [ R]. Washington D. C. : National Institute of Standards and Technology, NIST SP-800-31, 2001. 被引量:1
  • 5Eugene S. Intrusion prevention [J]. Computers & Security, 2004, 23(4) : 265-266. 被引量:1
  • 6Kim S, Lee J. A system architecture for high-speed deep packet inspection in signature-based network intrusion prevention [J].Journal of Systems Architecture, 2007, 56(5): 1383-7621. 被引量:1
  • 7Morton S. Using the danger model of immune systems for distributed defense in modern data networks [ J ]. Computer Networks, 2007, 51(5): 1315-1333. 被引量:1
  • 8Lye K, Jeannette M W. Game strategies in network security [ J ]. International Journal of Information Security, 2005,4 (2) : 71 -86. 被引量:1
  • 9Tansu A, Tamer B. A game theoretic analysis of intrusion detection in access control system[ A ]. In: Proceedings of 43rd IEEE Conference on Decision and Control [ C ]. Atlantis, Paradise Island: IEEE Control Systems Society, 2004. 1568-1573. 被引量:1
  • 10Huseyin C, Srinivasan R. Configuration of detection software : A comparison of decision and game theory approaches [ J ]. Decision Analysis, 2004, 1 (3) : 131-148. 被引量:1

共引文献19

同被引文献22

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部