Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

The base-rate fallacy and the difficulty of intrusion detection

Published: 01 August 2000 Publication History

Abstract

Many different demands can be made of intrusion detection systems. An important requirement is that an intrusion detection system be effective; that is, it should detect a substantial percentage of intrusions into the supervised system, while still keeping the false alarm rate at an acceptable level. This article demonstrates that, for a reasonable set of assumptions, the false alarm rate is the limiting factor for the performance of an intrusion detection system. This is due to the base-rate fallacy phenomenon, that in order to achieve substantial values of the Bayesian detection rate P(Intrusion***Alarm), we have to achieve a (perhaps in some cases unattainably) low false alarm rate. A selection of reports of intrusion detection performance are reviewed, and the conclusion is reached that there are indications that at least some types of intrusion detection have far to go before they can attain such low false alarm rates.

References

[1]
ANDERSON, J. P. 1980. Computer security threat monitoring and surveillance. 79F26400 26 Feb revised April 15.
[2]
AXELSSON, S. 1998. Research in intrusion-detection systems: A survey. 98--17.
[3]
AXELSSON, S. 2000. Intrusion-detection systems: A taxonomy and survey. 99-15 (March).
[4]
AXELSSON, S. 2000. A preliminary attempt to apply detection and estimation theory to intrusion detection. 00--4 (March).
[5]
AXELSSON, S., LINDQVIST, U., GUSTAFSON, U., AND JONSSON, E. 1998. An approach to UNIX security logging. In Proceedings of the 21st NIST-NCSC National Conference on Informa-tion Systems Security (Crystal City, Arlington, VA, Oct. 5-8). National Institute of Standards and Technology, Gaithersburg, MD, 62-75.
[6]
DEATHERAGE, B. H. 1972. Auditory and other sensory forms of information. In Human Engineering Guide to Equipment Design: Army, Navy, Air Force, H. Van Cott and R. Kinkade, Eds.
[7]
DEBAR, H., BECKER, M., AND SIBONI, D. 1992. A neural network component for an intrusion detection system. In Proceedings of the ACM/IEEE Symposium on Research in Security and Privacy (Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA, 240-250.
[8]
DENNING, D. E. 1987. An intrusion-detection model. IEEE Trans. Softw. Eng. SE-13, 2 (Feb.), 222-232.
[9]
DENNING,D.E.AND NEUMANN, P. G. 1985. Requirements and model for IDES: A real-time intrusion detection system.
[10]
HALME,L.AND KAHN, B. 1988. Building a security monitor with adaptive user work profiles. In Proceedings of the 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD, 000-000.
[11]
HELMAN,P.AND LIEPINS, G. 1993. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Trans. Softw. Eng. 19, 9 (Sept.), 886-901.
[12]
LANE,T.AND BRODLEY, C. E. 1999. Temporal sequence learning and data reduction for anomaly detection. ACM Trans. Inf. Syst. Secur. 2, 3, 295-331.
[13]
LEE, W. 1999. A data mining framework for building intrusion detection models. In Proceedings of the 1999 IEEE Computer Society Symposium on Research in Security and Privacy (Berkeley, CA, May). IEEE Computer Society Press, Los Alamitos, CA, 120-132.
[14]
LIPPMANN,R.P.,FRIED, D., GRAF, I., ET AL. 2000. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings of the DARPA Informa-tion Survivability Conference and Exposition (DISCEX '00, Hilton Head, South Carolina, Jan. 25-27). IEEE Computer Society Press, Los Alamitos, CA, 12-26.
[15]
LUNT, T. F. 1988. Automated audit trail analysis and intrusion detection. In Proceedings of the on 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD, 65-73.
[16]
MATTHEWS, R. 1996. Base-rate errors and rain forecasts. Nature 382, 6594, 766.
[17]
MATTHEWS, R. 1997. Decision-theoretic limits on earthquake prediction. Geophys. J. Int. 131, 3 (Dec.), 526-529.
[18]
MCHUGH, J. 2000. Testing intrusion detection systems: A critique of the 1998 and 1999 Lincoln Laboratory evaluations. ACM Trans. Inf. Syst. Secur. 3.
[19]
NYGREN, E. 1994. Moderna tider: teknikutveckling inom medicinsk service.
[20]
PIERCE, G. M. 1943. Destruction by demolition, incendiaries and sabotage: Field training manual, Fleet Marine Force, US Marine Corps.
[21]
RASMUSSEN, J. 1986. Information Processing and Human-Machine Interaction: An Approach to Cognitive Engineering. North-Holland Publishing Co., Amsterdam, The Netherlands.
[22]
RUSSELL,S.J.AND NORVIG, P. 1995. Artificial intelligence: a modern approach. Prentice-Hall series in artificial intelligence. Prentice-Hall, Inc., Upper Saddle River, NJ.
[23]
SEBRING,M.M.,SHELLHOUSE, E., HANNA,M.E.,AND WHITEHURST, R. A. 1988. Expert systems in intrusion detection: A case study. In Proceedings of the 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD, 74-81.

Cited By

View all
  • (2024)Comparative Analysis of Anomaly Detection Approaches in Firewall Logs: Integrating Light-Weight Synthesis of Security Logs and Artificially Generated Attack DetectionSensors10.3390/s2408263624:8(2636)Online publication date: 20-Apr-2024
  • (2024)On Data Leakage Prevention Maturity: Adapting the C2M2 FrameworkJournal of Cybersecurity and Privacy10.3390/jcp40200094:2(167-195)Online publication date: 30-Mar-2024
  • (2024)Extending C2 Traffic Detection Methodologies: From TLS 1.2 to TLS 1.3-enabled MalwareProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678921(181-196)Online publication date: 30-Sep-2024
  • Show More Cited By

Index Terms

  1. The base-rate fallacy and the difficulty of intrusion detection

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 August 2000
    Published in TISSEC Volume 3, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. base-rate fallacy
    2. detection rate
    3. false alarm rate
    4. intrusion detection

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)964
    • Downloads (Last 6 weeks)87
    Reflects downloads up to 26 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Comparative Analysis of Anomaly Detection Approaches in Firewall Logs: Integrating Light-Weight Synthesis of Security Logs and Artificially Generated Attack DetectionSensors10.3390/s2408263624:8(2636)Online publication date: 20-Apr-2024
    • (2024)On Data Leakage Prevention Maturity: Adapting the C2M2 FrameworkJournal of Cybersecurity and Privacy10.3390/jcp40200094:2(167-195)Online publication date: 30-Mar-2024
    • (2024)Extending C2 Traffic Detection Methodologies: From TLS 1.2 to TLS 1.3-enabled MalwareProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678921(181-196)Online publication date: 30-Sep-2024
    • (2024)Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based QuestionnairesProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678897(317-336)Online publication date: 30-Sep-2024
    • (2024)Introducing a Comprehensive, Continuous, and Collaborative Survey of Intrusion Detection DatasetsProceedings of the 17th Cyber Security Experimentation and Test Workshop10.1145/3675741.3675754(34-40)Online publication date: 13-Aug-2024
    • (2024)A Unified Time Series Analytics based Intrusion Detection Framework for CAN BUS AttacksProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653249(19-30)Online publication date: 19-Jun-2024
    • (2024)DRACE: A Framework for Evaluating Anomaly Detectors for Industrial Control SystemsProceedings of the 10th ACM Cyber-Physical System Security Workshop10.1145/3626205.3659145(77-87)Online publication date: 2-Jul-2024
    • (2024)CCS: A Cross-Plane Collaboration Strategy to Defend Against LDoS Attacks in SDNIEEE Transactions on Network and Service Management10.1109/TNSM.2024.336349021:3(3522-3536)Online publication date: 1-Jun-2024
    • (2024)Performance Evaluation of Network Intrusion Detection Using Machine Learning2024 IEEE International Conference on Consumer Electronics (ICCE)10.1109/ICCE59016.2024.10444363(1-6)Online publication date: 6-Jan-2024
    • (2024)Comparing Threshold Selection Methods for Network Anomaly DetectionIEEE Access10.1109/ACCESS.2024.345216812(124943-124973)Online publication date: 2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media