2010 Sixth International Conference on Information Assurance and Security 2010
DOI: 10.1109/isias.2010.5604064
|View full text |Cite
|
Sign up to set email alerts
|

RAPID: Reputation based approach for improving intrusion detection effectiveness

Abstract: Reducing false positives have been one of the toughest challenges and a very practical problem in real life deployments of intrusion detection systems. It leads to decreased confidence in the IDS alerts. The security analyst is faced with the choice between disabling valuable signatures that also generate false positives on one hand, and missing true alerts among the flood of false positives on the other hand. In this paper we present an architecture that utilizes IP reputation along with signature levels in o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
2
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 11 publications
1
2
0
Order By: Relevance
“…Third, the unsupervised detection results display the quantitative gain in the false detection rate of the ensemble over any of the constituent members with no expense to the true positive rate. This shows that the ensemble directly addresses the base rate fallacy and supports a growing body of literature in this area [9], [10], [11], [12], [13], [14], [15], [16]. Finally, our anomaly detection ensemble outperforms the supervised algorithms-perhaps surprising given that the latter is privy to other known malware profiles during training.…”
Section: A Contributionssupporting
confidence: 77%
“…Third, the unsupervised detection results display the quantitative gain in the false detection rate of the ensemble over any of the constituent members with no expense to the true positive rate. This shows that the ensemble directly addresses the base rate fallacy and supports a growing body of literature in this area [9], [10], [11], [12], [13], [14], [15], [16]. Finally, our anomaly detection ensemble outperforms the supervised algorithms-perhaps surprising given that the latter is privy to other known malware profiles during training.…”
Section: A Contributionssupporting
confidence: 77%
“…A number of studies have proposed approaches for reputation scoring of IPs in computer networks. To deduce the reputation scores, features are compared against those of known signatures [Fukushima et al 2011;Thomas 2010;Antonakakis et al 2010;Renjan et al 2018]. For example, Renjan et al [2018] propose a vector space approach that uses Euclidean distance to compare features of an IP address to those of blacklisted IPs.…”
Section: Reputation Scoringmentioning
confidence: 99%
“…The alert-set itself is also utilized in [29]. The method proposed therein is based on the calculation of reputation for alerts.…”
Section: Looking At Neighboring Alertsmentioning
confidence: 99%