Improving Accuracy in Decision Making for Detecting Intruders

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2013 by IJPTT Journal
Volume-3 Issue-1                           
Year of Publication : 2013
Authors : Monika Sehgal, Nitin Umesh

Citation

Monika Sehgal, Nitin Umesh."Improving Accuracy in Decision Making for Detecting Intruders ". International Journal of P2P Network Trends and Technology (IJPTT), V3(1):18-21  Jan - Feb 2013, ISSN:2249-2615, www.ijpttjournal.org. Published by Seventh Sense Research Group.

Abstract

Normal host based Intrusion detection system provides us some alerts of data integrity breach on the basis of policy violation and unauthorized access. There are some factors responsible if any employee of the enterprise access some files on which basis policy and permissions are applied. If these are incorrectly applied then false positive rate of intrusion detection increases. To minimize this rate and to better understand about the user who access unauthorized file, a framework is proposed which assemble data and information from diverse devices, and a special active record will be created, which will help the administrator to take better decision which will improve accuracy in decision making and more supportive policies and permissions can be implemented on intrusion detection system. This will also improve the storage system’s performance by less recovery operations.

References

[1] Carol J Fung, Jie Zhang and Raouf Boutaba, “Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks” , IEEE, 2012.
[2] Surachai CHITPINITYON, Kasom KOHT-ARSA, Surasak SANGUANPONG and Jatuporn CHUCHUAY, “Design and Implementation of Open Framework for Policy-Based Network Access Control”, IEEE,2009.
[3] Khalid Alsubhi, Issam Aib, Jerome Francois and Raouf Boutaba, “Policy-Based Security Con?guration Management Application to Intrusion Detection and Prevention”, IEEE, 2009.
[4] Amel Meddeb-Makhlouf, Yacine Djemaiel and Noureddine Boudriga, “Cooperating systems for Global Intrusion Detection and Tolerance”, IEEE, 2007.
[5] Mohammad Banikazemi, Dan Poff and Bulent Abali, “Storage-Based Intrusion Detection for Storage Area Networks (SANs)” Proc. of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST’05), IEEE

Keywords

Storage system, Policy, Database, Intrusion detection, Permission, Security.