Proceedings of the 6th ACM Conference on Computer and Communications Security 1999
DOI: 10.1145/319709.319710
|View full text |Cite
|
Sign up to set email alerts
|

The base-rate fallacy and its implications for the difficulty of intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
180
0
2

Year Published

2003
2003
2015
2015

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 215 publications
(184 citation statements)
references
References 8 publications
2
180
0
2
Order By: Relevance
“…Moreover, since the detector is based on data matrices only, update schemes seem worthwhile to explore. Currently, we are investigating mechanisms of dynamic feedback control for equation (3) as well ways to update the data matrix in order to adjust to evolving usage patterns. In another direction, combining statistical detection methods and semantic descriptions, i.e.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, since the detector is based on data matrices only, update schemes seem worthwhile to explore. Currently, we are investigating mechanisms of dynamic feedback control for equation (3) as well ways to update the data matrix in order to adjust to evolving usage patterns. In another direction, combining statistical detection methods and semantic descriptions, i.e.…”
Section: Resultsmentioning
confidence: 99%
“…In order to do this, we resort to a simple method of choosing the top 3, 6, and 9 deviations from within the 200 day test data set and check if the malware induced days are among them 3 In this context, the precision measures the percentage of these deviations actually belonging to the malware set and recall the percentage of malware detected in the set of given deviations. Ideally, recall should be 1 and precision {1, 0.5, 0.33} for {3, 6, 9} preset deviations, respectively.…”
Section: Feature (In Numbers Per Day)mentioning
confidence: 99%
See 1 more Smart Citation
“…Our goal of the evaluation on another crawled dataset is to test the actual operation and user experience without the ground truth from URL analysis by computing the Bayesian detection rate [21] -the probability of actually being at least a suspicious spammer, whenever an account is reported by the detection system. Specifically, we use Data set I, which has been labeled, as the training data set, and Data set II as the testing data.…”
Section: Evaluation On Dataset IImentioning
confidence: 99%
“…In order to evaluate the effectiveness [15] of IDS the use of Receiver Operating Characteristic (ROC) has been largely proposed [16], [17], [15], [18]. ROC curves plot detection rate versus false alarm rate.…”
Section: Introductionmentioning
confidence: 99%