Analysis of risks and costs in intruder detection with Markov Decision Processes
Let us assume that defence mechanisms are so strong that the average outcome of a hacking attack is unsuccessful. How to calculate the costs arising from false positives and false negatives in intruder detection? Is it better for the hacker to make fewer but more effective attacks rather than several but less effective attacks? How to calculate the difference between these alternative strategies?
 Denning, D.E.: An intrusion-detection model. IEEE Transactions on Software Engineering 13 (1987) 222–232.  Davison, B.D., Hirsh, H.: Predicting sequences of user actions. In: Proceedings of the AAAI-98/ICML-98 Joint Workshop on AI Approaches to Time-series Analysis. (1998) 5–12  DuMouchel, W.: Computer intrusion detection based on bayes factors for comparing command transition probabilities. Technical Report 91, National Institute of Statistical Sciences, Research Triangle Park, NC (1999)
 Ju, W.H., Vardi, Y.: A hybrid high-order markov chain model for computer intrusion detection. Technical Report 92, National Institute of Statistical Sciences, Research Triangle Park, NC (1999)  Lane, T., Brodley, C.E.”: An empirical study of two approaches to sequence learning for anomaly detection”. Machine Learning 51 (2003)73–107  Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.:” Self-nonself discrimination in a computer.” In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, Los Alamitos, CA, IEEE Computer Society Press (1994)  Balthrop, J., Esponda, F., Forrest, S., Glickman, M.: Coverage and generalization in an artificial immune system. In Langdon, W.B., Cantu-Paz, E., Mathias, K., Roy, R., Davis, D., Poli, R., Balakrishnan, K., Hanovar, V., Rudolph, G., Wegener, J., Bull, L., Potter, M.A., Schultz, A.C., Miller, J.F., Burke, E., Jonaska, N., eds.:Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2002), Morgan Kaufmann (2002) 3–10  Dasgupta, D., Gonz´alez, F.: An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation 6 (2002) 1081–1088  Kim, J., Bentley, P.J.: Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator. In: Proceedings of the 2002 Congress on Evolutionary Computation. (2001)  E. Jonsson and T. Olovsson. “A quantitative model of the security intrusion process based on attacker behavior,” IEEE Trans. on Software Engineering, 23(4):1-11, Apr 1997.  D. Nicol, W. Sanders and K. Trivedi. “Model-based evaluation: from dependability to security,” IEEE Trans. on Dependable and Secure Computing, 1(1):48-65, Jan 2004.  B. Madan, et al. “A method for modeling and quantifying the security attributes of intrusion tolerant systems,” Performance Evaluation,56:167-186,(2004).  A. Arnes, et al. “Real-time risk assessment with network sensors and intrusion detection systems,” in Computational Intelligence and Security, 388-397, Springer, 2005.  Y. Huang, D. Arsenault and A. Sood. “Incorruptible selfcleansing intrusion tolerance and its application to DNS security,” J. of Networks, 1(5):21-30, Sep 2006.  K. Joshi, et al. “Automated recovery using bounded partially observable Markov decision processes,” in Proc. of Dependable Systems and Networks (DSN), 445:456, Jun 2006.  O. Kreidl and T. Frazier. “Feedback control applied to survivability: a host-based autonomic defense system,” IEEE Trans. on Reliability, 53(1):148-166, Mar 2004.
 L. Dubins, L. Savage, How to gamble if you must, inequalities for stochastic processes, McGraw-Hill, 1965.
 F. P. Kelly, Reversibility and Stochastic Networks, New York: Wiley, 1979.
 E. Altman, “Applications of Markov Decision Processes in telecommunications: a survey,” Research Report RR-3984, MISTRAL-project, INRIA, 2000, p.51.
 T. Darling, and M.A. Shayman, “Network Intruder Location Using Markov Decision Processes,” in Third International Workshop on Recent Advances in Intrusion Detection (RAID 2000), 2000.
The submitter hereby warrants that the Work (collectively, the “Materials”) is original and that he/she is the author of the Materials. To the extent the Materials incorporate text passages, figures, data or other material from the works of others, the undersigned has obtained any necessary permissions. Where necessary, the undersigned has obtained all third party permissions and consents to grant the license above and has all copies of such permissions and consents.
The submitter represents that he/she has the power and authority to make and execute this assignment. The submitter agrees to indemnify and hold harmless the COMPUSOFT from any damage or expense that may arise in the event of a breach of any of the warranties set forth above. For authenticity, validity and originality of the research paper the author/authors will be totally responsible.