false alarm rate
Recently Published Documents


TOTAL DOCUMENTS

421
(FIVE YEARS 135)

H-INDEX

24
(FIVE YEARS 5)

2022 ◽  
Vol 12 (2) ◽  
pp. 852
Author(s):  
Jesús Díaz-Verdejo ◽  
Javier Muñoz-Calle ◽  
Antonio Estepa Alonso ◽  
Rafael Estepa Alonso ◽  
Germán Madinabeitia

Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of security components of most organizations. They can find traces of known attacks in the network traffic or host events for which patterns or signatures have been pre-established. SIDS include standard packages of detection rulesets, but only those rules suited to the operational environment should be activated for optimal performance. However, some organizations might skip this tuning process and instead activate default off-the-shelf rulesets without understanding its implications and trade-offs. In this work, we help gain insight into the consequences of using predefined rulesets in the performance of SIDS. We experimentally explore the performance of three SIDS in the context of web attacks. In particular, we gauge the detection rate obtained with predefined subsets of rules for Snort, ModSecurity and Nemesida using seven attack datasets. We also determine the precision and rate of alert generated by each detector in a real-life case using a large trace from a public webserver. Results show that the maximum detection rate achieved by the SIDS under test is insufficient to protect systems effectively and is lower than expected for known attacks. Our results also indicate that the choice of predefined settings activated on each detector strongly influences its detection capability and false alarm rate. Snort and ModSecurity scored either a very poor detection rate (activating the less-sensitive predefined ruleset) or a very poor precision (activating the full ruleset). We also found that using various SIDS for a cooperative decision can improve the precision or the detection rate, but not both. Consequently, it is necessary to reflect upon the role of these open-source SIDS with default configurations as core elements for protection in the context of web attacks. Finally, we provide an efficient method for systematically determining which rules deactivate from a ruleset to significantly reduce the false alarm rate for a target operational environment. We tested our approach using Snort’s ruleset in our real-life trace, increasing the precision from 0.015 to 1 in less than 16 h of work.


Author(s):  
P. Manoj Kumar ◽  
M. Parvathy ◽  
C. Abinaya Devi

Intrusion Detection Systems (IDS) is one of the important aspects of cyber security that can detect the anomalies in the network traffic. IDS are a part of Second defense line of a system that can be deployed along with other security measures such as access control, authentication mechanisms and encryption techniques to secure the systems against cyber-attacks. However, IDS suffers from the problem of handling large volume of data and in detecting zero-day attacks (new types of attacks) in a real-time traffic environment. To overcome this problem, an intelligent Deep Learning approach for Intrusion Detection is proposed based on Convolutional Neural Network (CNN-IDS). Initially, the model is trained and tested under a new real-time traffic dataset, CSE-CIC-IDS 2018 dataset. Then, the performance of CNN-IDS model is studied based on three important performance metrics namely, accuracy / training time, detection rate and false alarm rate. Finally, the experimental results are compared with those of various Deep Discriminative models including Recurrent Neural network (RNN), Deep Neural Network (DNN) etc., proposed for IDS under the same dataset. The Comparative results show that the proposed CNN-IDS model is very much suitable for modelling a classification model both in terms of binary and multi-class classification with higher detection rate, accuracy, and lower false alarm rate. The CNN-IDS model improves the accuracy of intrusion detection and provides a new research method for intrusion detection.


Author(s):  
Sara Haj Ebrahimi ◽  
Amid Khatibi

Today detection of new threats has become a need for secured communication to provide complete data confidentiality, integrity and availability. Design and development of such an intrusion detection system in the communication world, should not only be new, accurate and fast but also effective in an environment encompassing the surrounding network. In this paper, a new approach is proposed for network anomaly detection by combining neural network and clustering algorithms. We propose a modified Self Organizing Map algorithm which initially starts with null network and grows with the original data space as initial weight vector, updating neighborhood rules and learning rate dynamically in order to overcome the fixed architecture and random weight vector assignment of simple SOM. New nodes are created using distance threshold parameter and their neighborhood is identified using connection strength and its learning rule and the weight vector updating is carried out for neighborhood nodes. The Fuzzy k-means clustering algorithm is employed for grouping similar nodes of Modified SOM into k clusters using similarity measures. Performance of the new approach is evaluated with standard bench mark dataset. The new approach is evaluated using performance metrics such as detection rate and false alarm rate. The result is compared with other individual neural network methods, which shows considerable increase in the detection rate and 1.5% false alarm rate.


Symmetry ◽  
2022 ◽  
Vol 14 (1) ◽  
pp. 105
Author(s):  
Iuon-Chang Lin ◽  
Ching-Chun Chang ◽  
Chih-Hsiang Peng

Botnet is an urgent problem that will reduce the security and availability of the network. When the bot master launches attacks to certain victims, the infected users are awakened, and attacks start according to the commands from the bot master. Via Botnet, DDoS is an attack whose purpose is to paralyze the victim’s service. In all kinds of DDoS, SYN flood is still a problem that reduces security and availability. To enhance the security of the Internet, IDS is proposed to detect attacks and protect the server. In this paper, the concept of centroid-based classification is used to enhance performance of the framework. An anomaly-based IDS framework which combines K-means and KNN is proposed to detect SYN flood. Dimension reduction is designed to achieve visualization, and weights can adjust the occupancy ratio of each sub-feature. Therefore, this framework is also suitable for use on the modern symmetry or asymmetry architecture of information systems. With the detection by the framework proposed in this paper, the detection rate is 96.8 percent, the accuracy rate is 97.3 percent, and the false alarm rate is 1.37 percent.


Author(s):  
Divya Tiwari ◽  
Surbhi Thorat

Fake news dissemination is a critical issue in today’s fast-changing network environment. The issues of online fake news have attained an increasing eminence in the diffusion of shaping news stories online. This paper deals with the categorical cyber terrorism threats on social media and preventive approach to minimize their issues. Misleading or unreliable information in form of videos, posts, articles, URLs are extensively disseminated through popular social media platforms such as Facebook, Twitter, etc. As a result, editors and journalists are in need of new tools that can help them to pace up the verification process for the content that has been originated from social media. existing classification models for fake news detection have not completely stopped the spread because of their inability to accurately classify news, thus leading to a high false alarm rate. This study proposed a model that can accurately identify and classify deceptive news articles content infused on social media by malicious users. The news content, social-context features and the respective classification of reported news was extracted from the PHEME dataset using entropy-based feature selection. The selected features were normalized using Min-Max Normalization techniques. The model was simulated and its performance was evaluated by benchmarking with an existing model using detection accuracy, sensitivity, and precision as metrics. The result of the evaluation showed a higher 17.25% detection accuracy, 15.78% sensitivity, but lesser 0.2% precision than the existing model, Thus, the proposed model detects more fake news instances accurately based on news content and social content perspectives. This indicates that the proposed classification model has a better detection rate, reduces the false alarm rate of news instances and thus detects fake news more accurately.


2021 ◽  
Vol 2021 (1) ◽  
Author(s):  
Michele Russo ◽  
Nedim Šrndić ◽  
Pavel Laskov

AbstractIllicit cryptocurrency mining has become one of the prevalent methods for monetization of computer security incidents. In this attack, victims’ computing resources are abused to mine cryptocurrency for the benefit of attackers. The most popular illicitly mined digital coin is Monero as it provides strong anonymity and is efficiently mined on CPUs.Illicit mining crucially relies on communication between compromised systems and remote mining pools using the de facto standard protocol Stratum. While prior research primarily focused on endpoint-based detection of in-browser mining, in this paper, we address network-based detection of cryptomining malware in general. We propose XMR-Ray, a machine learning detector using novel features based on reconstructing the Stratum protocol from raw NetFlow records. Our detector is trained offline using only mining traffic and does not require privacy-sensitive normal network traffic, which facilitates its adoption and integration.In our experiments, XMR-Ray attained 98.94% detection rate at 0.05% false alarm rate, outperforming the closest competitor. Our evaluation furthermore demonstrates that it reliably detects previously unseen mining pools, is robust against common obfuscation techniques such as encryption and proxies, and is applicable to mining in the browser or by compiled binaries. Finally, by deploying our detector in a large university network, we show its effectiveness in protecting real-world systems.


Minerals ◽  
2021 ◽  
Vol 11 (11) ◽  
pp. 1294
Author(s):  
Honglei Wang ◽  
Zhenlei Li ◽  
Dazhao Song ◽  
Xueqiu He ◽  
Aleksei Sobolev ◽  
...  

Rockburst is a serious hazard in underground engineering, and accurate prediction of rockburst risk is challenging. To construct an intelligent prediction model of rockburst risk with interpretability and high accuracy, three binary scorecards predicting different risk levels of rockburst were constructed using ChiMerge, evidence weight theory, and the logistic regression algorithm. An intelligent rockburst prediction model based on scorecard methodology (IRPSC) was obtained by integrating the three scorecards. The effects of hazard sample category weights on the missed alarm rate, false alarm rate, and accuracy of the IRPSC were analyzed. Results show that the accuracy, false alarm rate, and missed alarm rate of the IRPSC for rockburst prediction in riverside hydropower stations are 75%, 12.5%, and 12.5%, respectively. Setting higher hazard sample category weights can reduce the missed alarm rate of IRPSC, but it will lead to a higher false alarm rate. The IRPSC can adaptively adjust the threshold and weight value of the indicator and convert the abstract machine learning model into a tabular form, which overcomes the commonly black box problems of machine learning model, as well as is of great significance to the application of machine learning in rockburst risk prediction.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Rongxia Wang ◽  
Malik Bader Alazzam ◽  
Fawaz Alassery ◽  
Ahmed Almulihi ◽  
Marvin White

Predicting the trajectories of neighboring vehicles is essential to evade or mitigate collision with traffic participants. However, due to inadequate previous information and the uncertainty in future driving maneuvers, trajectory prediction is a difficult task. Recently, trajectory prediction models using deep learning have been addressed to solve this problem. In this study, a method of early warning is presented using fuzzy comprehensive evaluation technique, which evaluates the danger degree of the target by comprehensively analyzing the target’s position, horizontal and vertical distance, speed of the vehicle, and the time of the collision. Because of the high false alarm rate in the early warning systems, an early warning activation area is established in the system, and the target state judgment module is triggered only when the target enters the activation area. This strategy improves the accuracy of early warning, reduces the false alarm rate, and also speeds up the operation of the early warning system. The proposed system can issue early warning prompt information to the driver in time and avoid collision accidents with accuracy up to 96%. The experimental results show that the proposed trajectory prediction method can significantly improve the vehicle network collision detection and early warning system.


2021 ◽  
Vol 2066 (1) ◽  
pp. 012027
Author(s):  
Xiaoxing Kou

Abstract With the rapid development of the national construction industry, cracks and other problems often appear in the concrete structure during the initial and subsequent construction. When these problems develop further, the structural safety of the entire building may be compromised. Therefore, it is necessary to analyze the causes of cracks and other problems in concrete buildings, and be able to monitor and analyze these problems in time, and then propose reasonable solutions. This is already a problem that the entire construction technicians urgently need to solve. This paper studies the algorithm for monitoring stress points of concrete penstocks in large construction projects. Firstly, it uses literature research to explain the form of stress nodes in large-scale construction projects and the deficiencies in the research on the stress nodes of concrete penstocks in large-scale construction projects. In the experiment, the existing 3 algorithms are used to detect the force points, and compare their detection degree and false alarm rate. The experimental results show that the detection effect of the KNN algorithm is obviously inferior to the other two algorithms with the same neighbor parameters. Its detection rate is only 91%, and the false alarm rate reaches 30%. The other two algorithms are equivalent. The detection effect of the KNN algorithm is obviously inferior to the other two algorithms, the detection rate is poor, the outlier force points that are obviously deviating from the whole around the dense force points are not recognized, and the data of many normal force points located at the edge of the sparse area Instead, it was recognized as abnormal. Among the three algorithms, the detection rate of the NLOF algorithm is better, reaching 99%, which is significantly higher than the other two algorithms.


Sign in / Sign up

Export Citation Format

Share Document