Analysis of Data Dependency Based Intrusion Detection System

  • Authors:
  • Yermek Nugmanov;Brajendra Panda;Yi Hu

  • Affiliations:
  • Computer Science and Computer Engineering Department, University of Arkansas, Fayetteville 72701;Computer Science and Computer Engineering Department, University of Arkansas, Fayetteville 72701;Computer Science Department, Northern Kentucky University, Highland Heights, 41099

  • Venue:
  • Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

This research focuses on analyzing the cost effectiveness of a database intrusion detection system that uses dependencies among data items to detect malicious transactions. The model suggested in this paper considers three main factors: the quality of intrusion detection, the probability of intrusion, and the cost structure of an organization whose data is protected by the intrusion detection system. We developed a step by step approach that helps in determining the optimal configuration expressed by the response strategy and the threshold value. The experimental results show that our model is capable of finding the optimal configuration while taking the cost structure of an organization into consideration.