A cost-based analysis of intrusion detection system configuration under active or passive response

  • Authors:
  • Wei T. Yue;Metin Çakanyıldırım

  • Affiliations:
  • Department of Information Systems, City University of Hong Kong, Tat Chee Avenue, Kowloon Tong, Hong Kong;School of Management, University of Texas at Dallas, P. O. Box830688, Richardson, TX 75083-0688, United States

  • Venue:
  • Decision Support Systems
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper studies the joint decisions of IDS configuration and alarm investigation capacity under active and passive responses. In active response, alarm events are blocked immediately, whereas alarm events are allowed to access the information assets in the passive response. Despite facilitating information flow, passive response exposes the assets to attacks while the security analysts investigate the alarms. On the other hand, active response may unnecessarily delay the benign traffic since alarm events are blocked. We find closed-form formulas for the optimal investigation capacity and show the optimal configuration under active response is smaller than under passive response. We also provide expressions that can be used to evaluate security costs and benefits under various configurations, capacities and responses. Numerical studies are done to illustrate the sensitivity of the optimal decisions.