Please use this identifier to cite or link to this item:
https://doi.org/10.1109/TIFS.2008.928539
DC Field | Value | |
---|---|---|
dc.title | Data fusion and cost minimization for intrusion detection | |
dc.contributor.author | Parikh D. | |
dc.contributor.author | Chen T. | |
dc.date.accessioned | 2018-08-21T05:05:37Z | |
dc.date.available | 2018-08-21T05:05:37Z | |
dc.date.issued | 2008 | |
dc.identifier.citation | Parikh D., Chen T. (2008). Data fusion and cost minimization for intrusion detection. IEEE Transactions on Information Forensics and Security 3 (3) : 381-389. ScholarBank@NUS Repository. https://doi.org/10.1109/TIFS.2008.928539 | |
dc.identifier.issn | 15566013 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/146241 | |
dc.description.abstract | Statistical pattern recognition techniques have recently been shown to provide a finer balance between misdetections and false alarms than the more conventional intrusion detection approaches, namely misuse detection and anomaly detection. A variety of classical machine learning and pattern recognition algorithms has been applied to intrusion detection with varying levels of success. We make two observations about intrusion detection. One is that intrusion detection is significantly more effective by using multiple sources of information in an intelligent way, which is precisely what human experts rely on. Second, different errors in intrusion detection have different costs associated with them-a simplified example being that a false alarm may be more expensive than a misdetection and, hence, the true objective function to be minimized is the cost of errors and not the error rate itself. We present a pattern recognition approach that addresses both of these issues. It utilizes an ensemble of a classifiers approach to intelligently combine information from multiple sources and is explicitly tuned toward minimizing the cost of the errors as opposed to the error rate itself. The information fusion approach dLEARNIN alone is shown to achieve state-of-the-art performances better than those reported in the literature so far, and the cost minimization strategy dCMS further reduces the cost with a significant margin. | |
dc.source | Scopus | |
dc.subject | Cost minimization | |
dc.subject | Data fusion | |
dc.subject | DCMS | |
dc.subject | DLEARNIN | |
dc.subject | Pattern recognition for intrusion detection | |
dc.type | Article | |
dc.contributor.department | OFFICE OF THE PROVOST | |
dc.contributor.department | DEPARTMENT OF COMPUTER SCIENCE | |
dc.description.doi | 10.1109/TIFS.2008.928539 | |
dc.description.sourcetitle | IEEE Transactions on Information Forensics and Security | |
dc.description.volume | 3 | |
dc.description.issue | 3 | |
dc.description.page | 381-389 | |
dc.published.state | published | |
dc.grant.fundingagency | NSC, National Science Council | |
dc.grant.fundingagency | NSF, National Science Foundation | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.