Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

نویسندگان

  • Alok Gupta
  • Dmitry Zhdanov
چکیده

The original dataset consists of data on over four million connections each described by 42 attributes (e.g., duration, protocol, etc.) and identified either as normal traffic or one of 24 attack types. Our simulation is designed as follows: 1. A total of 20,000 connections were randomly selected from the original dataset to form the simulation training set; 16 attack types were represented in the simulation set. 2. The simulation training set was duplicated to represent the simulation test set with the same distribution of attacks as in the training set. 3. The 20,000 connections in the training set were randomly split into 20 groups of 1,000. These groups represent firms. It is assumed that each firm can independently observe 1,000 connections. 4. One firm was chosen to start the network (network size = 1, pool of connections = 1,000). 5. The proportion of attack connections in the connection pool was computed and provided the probability of attack, Pa. 6. Based on the pool of connections, the decision tree was built to classify the attacks using the C4.5 algorithm (Quinlan 1993). 7. The output of C4.5 algorithm was tested against a random subset of attacks from the testing set. The testing subset is half the size of the training subset. The proportion of misclassified attacks in the testing subset was computed and provided the probability of attack success, Ps (on the assumption that if the attack was not identified correctly, then no appropriate defense would be activated). 8. Network size was incremented by 1 (until it reached 20; for example, after first iteration, network size = 2, pool of connections = 2,000). Return to step 5.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...

متن کامل

Framing the Health Workforce Agenda Beyond Economic Growth

The fourth Global Forum on Human Resources (HRH) for Health was held in Ireland November 2017. Its Dublin declaration mentions that strategic investments in the health workforce could contribute to sustainable and inclusive growth and are an imperative to shared prosperity. What is remarkable about the investment frame for health workforce development is that there is little debate about the ty...

متن کامل

Innovation in the Agro-Food Sector: from Technical Innovation-Centred Approaches to Sustainability Transition Processes

Innovation is a complex phenomenon and process involving translation of knowledge into new techniques, products, services. It is considered crucial for sustainable agriculture development and achievement of long-term food security. The review describes the diversity of innovation and relates it to agro-food sector. It also sheds light on different innovation models and explores their contributi...

متن کامل

Internet Banking Law: An Iranian Perspective Problems and Prospects of Introducing Islamic Microfinance in Azerbaijan Republic

Bank supervision and monetary policy are strategic concepts in the economy of countries. Development of electronic communications, especially in online and international spheres, has largely threatened financial services in view of security and illegal access to banking networks. Anonymity and identity theft has endangered electronic commerce by crimes like phishing, fraud and different types...

متن کامل

A Case for Open Network Health Systems: Systems as Networks in Public Mental Health

Increases in incidents involving so-called confused persons have brought attention to the potential costs of recent changes to public mental health (PMH) services in the Netherlands. Decentralized under the (Community) Participation Act (2014), local governments must find resources to compensate for reduced central funding to such services or “innovate.” But innovation, even when pressure for c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • MIS Quarterly

دوره 36  شماره 

صفحات  -

تاریخ انتشار 2012