Improving Accuracy in Decision Making for Detecting Intruders
|
International Journal of P2P Network Trends and Technology (IJPTT) | |
© 2013 by IJPTT Journal | ||
Volume-3 Issue-1 |
||
Year of Publication : 2013 | ||
Authors : Monika Sehgal, Nitin Umesh |
Citation
Monika Sehgal, Nitin Umesh."Improving Accuracy in Decision Making for Detecting Intruders ". International Journal of P2P Network Trends and Technology (IJPTT), V3(1):18-21 Jan - Feb 2013, ISSN:2249-2615, www.ijpttjournal.org. Published by Seventh Sense Research Group.
Abstract
Normal host based Intrusion detection system provides us some alerts of data integrity breach on the basis of policy violation and unauthorized access. There are some factors responsible if any employee of the enterprise access some files on which basis policy and permissions are applied. If these are incorrectly applied then false positive rate of intrusion detection increases. To minimize this rate and to better understand about the user who access unauthorized file, a framework is proposed which assemble data and information from diverse devices, and a special active record will be created, which will help the administrator to take better decision which will improve accuracy in decision making and more supportive policies and permissions can be implemented on intrusion detection system. This will also improve the storage system’s performance by less recovery operations.
References
[1] Carol J Fung, Jie Zhang and Raouf Boutaba, “Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks” , IEEE, 2012.
[2] Surachai CHITPINITYON, Kasom KOHT-ARSA, Surasak SANGUANPONG and Jatuporn CHUCHUAY, “Design and Implementation of Open Framework for Policy-Based Network Access Control”, IEEE,2009.
[3] Khalid Alsubhi, Issam Aib, Jerome Francois and Raouf Boutaba, “Policy-Based Security Con?guration Management Application to Intrusion Detection and Prevention”, IEEE, 2009.
[4] Amel Meddeb-Makhlouf, Yacine Djemaiel and Noureddine Boudriga, “Cooperating systems for Global Intrusion Detection and Tolerance”, IEEE, 2007.
[5] Mohammad Banikazemi, Dan Poff and Bulent Abali, “Storage-Based Intrusion Detection for Storage Area Networks (SANs)” Proc. of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST’05), IEEE
Keywords
Storage system, Policy, Database, Intrusion detection, Permission, Security.