Threat-model-driven runtime adaptation and evaluation of intrusion detection system

  • Authors:
  • Martin Rehak;Eugen Staab;Volker Fusenig;Jan Stiborek;Martin Grill;Karel Bartos;Michal Pechoucek;Thomas Engel

  • Affiliations:
  • Czech Technical University, Prague, Czech Rep;University of Luxembourg, Luxembourg, Luxembourg;University of Luxembourg, Luxembourg, Luxembourg;Czech Technical University, Prague, Czech Rep;Czech Technical University/CESNET, z.s.p.o., Prague, Czech Rep;Czech Technical University/CESNET, z.s.p.o., Prague, Czech Rep;Czech Technical University, Prague, Czech Rep;University of Luxembourg, Luxembourg, Luxembourg

  • Venue:
  • ICAC '09 Proceedings of the 6th international conference on Autonomic computing
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a mechanism for autonomous self-adaptation of a network-based intrusion detection system (IDS). The system is composed of a set of cooperating agents, each of which is based on an existing network behavior analysis method. The self adaptation mechanism is based on the insertion of a small number of challenges, i.e. known instances of past legitimate or malicious behavior. The response of individual system components to these challenges is used to measure and eventually optimize the system performance in terms of accuracy. In this work we show how to choose the challenges in a way such that the IDS attaches more importance to the detection of attacks that cause much damage.