Sciweavers

92 search results - page 3 / 19
» Minimizing Expected Attacking Cost in Networks
Sort
View
CORR
2008
Springer
146views Education» more  CORR 2008»
13 years 5 months ago
Intrusion Detection Using Cost-Sensitive Classification
Intrusion Detection is an invaluable part of computer networks defense. An important consideration is the fact that raising false alarms carries a significantly lower cost than not...
Aikaterini Mitrokotsa, Christos Dimitrakakis, Chri...
JCS
2002
103views more  JCS 2002»
13 years 5 months ago
Toward Cost-Sensitive Modeling for Intrusion Detection and Response
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion...
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. S...
STOC
2005
ACM
129views Algorithms» more  STOC 2005»
14 years 6 months ago
Learning with attribute costs
We study an extension of the "standard" learning models to settings where observing the value of an attribute has an associated cost (which might be different for differ...
Haim Kaplan, Eyal Kushilevitz, Yishay Mansour
JNSM
2008
93views more  JNSM 2008»
13 years 5 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia
IPTPS
2005
Springer
13 years 11 months ago
A Taxonomy of Rational Attacks
Abstract— For peer-to-peer services to be effective, participating nodes must cooperate, but in most scenarios a node represents a self-interested party and cooperation can neith...
Seth James Nielson, Scott A. Crosby, Dan S. Wallac...