Setting optimal intrusion-detection thresholds

@article{Soh1995SettingOI,
  title={Setting optimal intrusion-detection thresholds},
  author={Ben Soh and Tharam S. Dillon},
  journal={Comput. Secur.},
  year={1995},
  volume={14},
  pages={621-631}
}
  • Ben Soh, Tharam S. Dillon
  • Published in Comput. Secur. 1995
  • Computer Science
  • In this paper a model is developed to study an intrusion detection process. From the model, a measure called the Secure Computation Index is proposed. This index is used to quantify the total aspect of an intrusion-safe (or intrusionresistant) system. Comparative studies based on the index can assist in making decisions on optimal strategic controls against any possible system intrusion. In this paper, we show how the model can be used to help in setting optimal intrusion-detection thresholds… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Topics from this paper.

    Citations

    Publications citing this paper.
    SHOWING 1-9 OF 9 CITATIONS

    On Efficient Security Modelling of Complex Interconnected Communication Systems based on Markov Processes

    VIEW 4 EXCERPTS
    HIGHLY INFLUENCED

    A Study of ESMTC(Enterprise Security Management System Based on Threshold Classification)

    VIEW 1 EXCERPT
    CITES BACKGROUND

    Physical Security and Vulnerability Modeling for Infrastructure Facilities

    VIEW 1 EXCERPT
    CITES BACKGROUND

    Detecting disruptive routers: a distributed network monitoring approach

    VIEW 1 EXCERPT
    CITES BACKGROUND