Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1128817.1128834acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
Article

Measuring intrusion detection capability: an information-theoretic approach

Published: 21 March 2006 Publication History
  • Get Citation Alerts
  • Abstract

    A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate an intrusion detection system (IDS) in terms of its ability to correctly classify events as normal or intrusive. Traditional metrics (e.g., true positive rate and false positive rate) measure different aspects, but no single metric seems sufficient to measure the capability of intrusion detection systems. The lack of a single unified metric makes it difficult to fine-tune and evaluate an IDS. In this paper, we provide an in-depth analysis of existing metrics. Specifically, we analyze a typical cost-based scheme [6], and demonstrate that this approach is very confusing and ineffective when the cost factor is not carefully selected. In addition, we provide a novel information-theoretic analysis of IDS and propose a new metric that highly complements cost-based analysis. When examining the intrusion detection process from an information-theoretic point of view, intuitively, we should have less uncertainty about the input (event data) given the IDS output (alarm data). Thus, our new metric, CI D (Intrusion Detection Capability), is defined as the ratio of the mutual information between the IDS input and output to the entropy of the input. CI D has the desired property that: (1) It takes into account all the important aspects of detection capability naturally, i.e., true positive rate, false positive rate, positive predictive value, negative predictive value, and base rate; (2) it objectively provides an intrinsic measure of intrusion detection capability; and (3) it is sensitive to IDS operation parameters such as true positive rate and false positive rate, which can demonstrate the effect of the subtle changes of intrusion detection systems. We propose CI D as an appropriate performance measure to maximize when fine-tuning an IDS. The obtained operation point is the best that can be achieved by the IDS in terms of its intrinsic ability to classify input data. We use numerical examples as well as experiments of actual IDSs on various data sets to show that by using CI D, we can choose the best (optimal) operating point for an IDS and objectively compare different IDSs.

    References

    [1]
    S. Axelsson. The base-rate fallacy and its implications for the difficulty of intrusion detection. In Proceedings of ACM CCS'1999, November 1999.
    [2]
    S. Axelsson. A preliminary attempt to apply detection and estimation theory to intrusion detection. Technical Report 00-4, Dept. of Computer Engineering, Chalmers University of Technology, Sweden, March 2000.
    [3]
    T. Cover and J. Thomas. Elements of Information Theory. John Wiley, 1991.
    [4]
    M. Dacier. Design of an intrusion-tolerant intrusion detection system, Maftia Project, deliverable 10. Available at http://www.maftia.org/deliverables/D10.pdf. 2005.
    [5]
    D. Denning. An intrusion-detection model. IEEE Transactions on Software Engineering, 13(2), Feb 1987.
    [6]
    J. E. Gaffney and J. W. Ulvila. Evaluation of intrusion detectors: A decision theory approach. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, May 2001.
    [7]
    I. Graf, R. Lippmann, R. Cunningham, K. K. D. Fried, S. Webster, and M. Zissman. Results of DARPA 1998 off-line intrusion detection evaluation. Presented at DARPA PI Meeting, 15 December 1998.
    [8]
    G. Gu, P. Fogla, D. Dagon, W. Lee, and B. Skoric. An information-theoretic measure of intrusion detection capability. Technical Report GIT-CC-05-10, College of Computing, Georgia Tech, 2005.
    [9]
    J. Hancock and P. Wintz. Signal Detection Theory. McGraw-Hill, 1966.
    [10]
    P. Helman and G. Liepins. Statistical foundations of audit trial analysis for the detection of computer misuse. IEEE Transactions on Software Engineering, 19(9), September 1993.
    [11]
    W. Lee and D. Xiang. Information-theoretic measures for anomaly detection. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, May 2001.
    [12]
    R. P. Lippmann, D. J. Fried, and I. G. etc. Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation. In Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX'00), 2000.
    [13]
    M. V. Mahoney and P. K. Chan. Phad: Packet header anomaly detection for indentifying hostile network traffic. Technical Report CS-2001-4, Florida Tech, 2001.
    [14]
    R. Maxion and K. M. C. Tan. Benchmarking anomaly-based detection systems. In Proceedings of DSN'2000, 2000.
    [15]
    J. McHugh. Testing intrusion detection systems: A critique of the 1998 and 1999 darpa off-line intrusion detection system evaluation as performed by lincoln laboratory. ACM Transactions on Information and System Security, 3(4), November 2000.
    [16]
    MIT Lincoln Laboratory. 1999 darpa intrusion detection evaluation data set overview. http://www.ll.mit.edu/IST/ideval/, 2001.
    [17]
    V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23--24): 2435--2463, December 1999.
    [18]
    J. Pluim, J. Maintz, and M. Viergever. Mutual information based registration of medical images: A survey. IEEE Trans on Medical Imaging, 22(8):986--1004, Aug 2003.
    [19]
    T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks Inc., January 1998. http://www.aciri.org/vern/Ptacek-Newsham-Evasion-98.ps.
    [20]
    N. J. Puketza, K. Zhang, M. Chung, B. Mukherjee, and R. A. Olsson. A methodology for testing intrusion detection systems. IEEE Transactions on Software Engineering, 22(10): 719--729, 1996.
    [21]
    R. F. Puppy. Libwhisker official release v2.1, 2004. Available at http://www.wiretrip.net/rfp/lw.asp.
    [22]
    M. Roesch. Snort - lightweight intrusion detection for networks. In Proceedings of USENIX LISA '99, 1999.
    [23]
    A. Strehl. Relationship-based clustering and cluster ensembles for high-dimensional data mining, May 2002. PhD thesis, The University of Texas at Austin.
    [24]
    J. A. Swets. Measuring the accuracy of diagnostic systems. Science, 240(4857): 1285--1293, 1988.
    [25]
    K. Wang and S. J. Stolfo. Anomalous payload-based network intrusion detection. In Proceedings of RAID'2004, September 2004.

    Cited By

    View all
    • (2024)A Systematic Analysis of Security Metrics for Industrial Cyber–Physical SystemsElectronics10.3390/electronics1307120813:7(1208)Online publication date: 25-Mar-2024
    • (2024)Optimizing Cybersecurity Attack Detection in Computer Networks: A Comparative Analysis of Bio-Inspired Optimization Algorithms Using the CSE-CIC-IDS 2018 DatasetApplied Sciences10.3390/app1403104414:3(1044)Online publication date: 25-Jan-2024
    • (2024)Early Attack Detection for Securing GOOSE Network TrafficIEEE Transactions on Smart Grid10.1109/TSG.2023.327274915:1(899-910)Online publication date: Jan-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security
    March 2006
    384 pages
    ISBN:1595932720
    DOI:10.1145/1128817
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 March 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. information-theoretic
    2. intrusion detection
    3. performance measurement

    Qualifiers

    • Article

    Conference

    Asia CCS06
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 418 of 2,322 submissions, 18%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)44
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Systematic Analysis of Security Metrics for Industrial Cyber–Physical SystemsElectronics10.3390/electronics1307120813:7(1208)Online publication date: 25-Mar-2024
    • (2024)Optimizing Cybersecurity Attack Detection in Computer Networks: A Comparative Analysis of Bio-Inspired Optimization Algorithms Using the CSE-CIC-IDS 2018 DatasetApplied Sciences10.3390/app1403104414:3(1044)Online publication date: 25-Jan-2024
    • (2024)Early Attack Detection for Securing GOOSE Network TrafficIEEE Transactions on Smart Grid10.1109/TSG.2023.327274915:1(899-910)Online publication date: Jan-2024
    • (2024)Unknown, Atypical and Polymorphic Network Intrusion Detection: A Systematic SurveyIEEE Transactions on Network and Service Management10.1109/TNSM.2023.329853321:1(1190-1212)Online publication date: Mar-2024
    • (2024)Incremental Adversarial Learning for Polymorphic Attack DetectionIEEE Transactions on Machine Learning in Communications and Networking10.1109/TMLCN.2024.34187562(869-887)Online publication date: 2024
    • (2024)Enhanced Active Eavesdroppers Detection System for Multihop WSNs in Tactical IoT ApplicationsIEEE Internet of Things Journal10.1109/JIOT.2023.331304811:4(6748-6760)Online publication date: 15-Feb-2024
    • (2023)Hybrid Rule based Classification of Attacks in Internet of Things (IoT) Intrusion Detection System2023 7th International Conference on Computing Methodologies and Communication (ICCMC)10.1109/ICCMC56507.2023.10083504(1249-1254)Online publication date: 23-Feb-2023
    • (2023)Flow-based intrusion detection on software-defined networks: a multivariate time series anomaly detection approachNeural Computing and Applications10.1007/s00521-023-08376-535:16(12175-12193)Online publication date: 5-Mar-2023
    • (2023)Data-Driven Evaluation of Intrusion Detectors: A Methodological FrameworkFoundations and Practice of Security10.1007/978-3-031-30122-3_9(142-157)Online publication date: 1-Apr-2023
    • (2023)Intrusion Detection and PreventionGuide to Cybersecurity in Digital Transformation10.1007/978-3-031-26845-8_3(131-179)Online publication date: 19-Apr-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media