International Journal of P2P
Network Trends and Technology

Research Article | Open Access | Download PDF
Volume 3 | Issue 1 | Year 2013 | Article Id. IJPTT-V3I1P407 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I1P407

Improving Accuracy in Decision Making for Detecting Intruders


Monika Sehgal, Nitin Umesh

Citation :

Monika Sehgal, Nitin Umesh, "Improving Accuracy in Decision Making for Detecting Intruders," International Journal of P2P Network Trends and Technology (IJPTT), vol. 3, no. 1, pp. 18-21, 2013. Crossref, https://doi.org/10.14445/22492615/ IJPTT-V3I1P407

Abstract

Normal host based Intrusion detection system provides us some alerts of data integrity breach on the basis of policy violation and unauthorized access. There are some factors responsible if any employee of the enterprise access some files on which basis policy and permissions are applied. If these are incorrectly applied then false positive rate of intrusion detection increases. To minimize this rate and to better understand about the user who access unauthorized file, a framework is proposed which assemble data and information from diverse devices, and a special active record will be created, which will help the administrator to take better decision which will improve accuracy in decision making and more supportive policies and permissions can be implemented on intrusion detection system. This will also improve the storage system’s performance by less recovery operations.

Keywords

Storage system, Policy, Database, Intrusion detection, Permission, Security.

References

[1] Carol J Fung, Jie Zhang and Raouf Boutaba, “Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks” , IEEE, 2012.
[2] Surachai CHITPINITYON, Kasom KOHT-ARSA, Surasak SANGUANPONG and Jatuporn CHUCHUAY, “Design and Implementation of Open Framework for Policy-Based Network Access Control”, IEEE,2009.
[3] Khalid Alsubhi, Issam Aib, Jerome Francois and Raouf Boutaba, “Policy-Based Security Configuration Management Application to Intrusion Detection and Prevention”, IEEE, 2009.
[4] Amel Meddeb-Makhlouf, Yacine Djemaiel and Noureddine Boudriga, “Cooperating systems for Global Intrusion Detection and Tolerance”, IEEE, 2007. [5] Mohammad Banikazemi, Dan Poff and Bulent Abali, “Storage-Based Intrusion Detection for Storage Area Networks (SANs)” Proc. of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST‟05), IEEE.
[6] Difan Zhang, Wei Yu and Rommie Hardy, “A Distributed Network-Sensor Based Intrusion Detection Framework in Enterprise Networks” IEEE, 2011.
[7] Hazem Hamed and Ehab Al-Shaer, “Taxonomy of Conflicts in Network Security Policies”, DePaul University, 2006 IEEE.
[8] Sarwar Alam “Network Security And Intrusion Detection System” Department of Computer Science and Engineering, BRAC University, Dhaka, Bangladesh, (2007).
[9] http://www.tripwire.org [10] http://www.ossec.net
[11]http://www.darkreading.com/insiderthreat/167801100/security/securitymanagement/232900252/biggest-threats-come-from-insidethe-enterprise-survey-says.html
[12] The State of Network Security: Attitudes and Opinions AlgoSec Survey Insights (2012).