CS 166: Information Security
- Prof. Tom Austin
Authorization: Intrusion Detection Prof. Tom Austin San Jos State - - PowerPoint PPT Presentation
CS 166: Information Security Authorization: Intrusion Detection Prof. Tom Austin San Jos State University Prevention vs. Detection Most systems we've discussed focus on keeping the bad guys out. Intrusion prevention is a traditional
H0 H1 H2 H3 .10 .40 .40 .10
q
Is this normal use for Alice?
q
We compute S = (H0-A0)2+(H1-A1)2+…+(H3-A3)2 = .02
q
Recently, “Alice” has accessed Fn at rate An
A0 A1 A2 A3 .10 .40 .30 .20
H0 H1 H2 H3 .10 .40 .38 .12
q Is this normal use? q Compute S = (H0-A0)2+…+(H3-A3)2 = .0488
q And we again update the long term averages:
q Suppose new
A0 A1 A2 A3 .10 .30 .30 .30
H0 H1 H2 H3 .10 .40 .40 .10
q Statistics slowly evolve to match behavior q This reduces false alarms for SA q But also opens an avenue for attack…
q After 2 iterations,
H0 H1 H2 H3 .10 .38 .364 .156