{"title":"Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives","authors":"Sourour Meharouech, A. Bouhoula, Tarek Abbes","doi":"10.1109/CICYBS.2009.4925097","DOIUrl":"https://doi.org/10.1109/CICYBS.2009.4925097","url":null,"abstract":"Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are now considered a mainstream security technology. IDS and IPS are designed to identify security breaches. However, one of the most important problems with current IDS and IPS is the lack of the “environmental awareness” (i.e. security policy, network topology and software). This ignorance triggers many false positives (false alerts) and false negatives (undetected attacks). In this paper, we propose a novel intrusion detection and prevention architecture where we integrate the characteristics and the properties of the protected system in the traffic analysis process. The experimental evaluation shows the effectiveness of our solution. In fact, we measure a reduction of 89.59 % of false positives and 79.18 % of false negatives.","PeriodicalId":419764,"journal":{"name":"IEEE Symposium on Computational Intelligence in Cyber Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132759251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011","authors":"","doi":"10.1109/cics18479.2011","DOIUrl":"https://doi.org/10.1109/cics18479.2011","url":null,"abstract":"","PeriodicalId":419764,"journal":{"name":"IEEE Symposium on Computational Intelligence in Cyber Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134581403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}