Abstract
Most modern network-based intrusion detection systems (IDSs) passively monitor network traffic to identify possible attacks through known vectors. Though useful, this approach has widely known high false positive rates, often causing administrators to suffer from a "cry Wolf effect," where they ignore all warnings because so many have been false. In this paper, we focus on a method to reduce this effect using an idea borrowed from computer vision and neuroscience called active perception. Our approach is informed by theoretical ideas from decision theory and recent research results in neuroscience. The active perception agent allocates computational and sensing resources to (approximately) optimize its Value of Information. To do this, it draws on models to direct sensors towards phenomena of greatest interest to inform decisions about cyber defense actions. By identifying critical network assets, the organization's mission measures self-interest (and value of information). This model enables the system to follow leads from inexpensive, inaccurate alerts with targeted use of expensive, accurate sensors. This allows the deployment of sensors to build structured interpretations of situations. From these, an organization can meet missioncentered decision-making requirements with calibrated responses proportional to the likelihood of true detection and degree of threat.
Original language | English (US) |
---|---|
Title of host publication | WS-16-01 |
Subtitle of host publication | Artificial Intelligence Applied to Assistive Technologies and Smart Environments; WS-16-02: AI, Ethics, and Society; WS-16-03: Artificial Intelligence for Cyber Security; WS-16-04: Artificial Intelligence for Smart Grids and Smart Buildings; WS-16-05: Beyond NP; WS-16-06: Computer Poker and Imperfect Information Games; WS-16-07: Declarative Learning Based Programming; WS-16-08: Expanding the Boundaries of Health Informatics Using AI; WS-16-09: Incentives and Trust in Electronic Communities; WS-16-10: Knowledge Extraction from Text; WS-16-11: Multiagent Interaction without Prior Coordination; WS-16-12: Planning for Hybrid Systems; WS-16-13: Scholarly Big Data: AI Perspectives, Challenges, and Ideas; WS-16-14: Symbiotic Cognitive Systems; WS-16-15: World Wide Web and Population Health Intelligence |
Publisher | AI Access Foundation |
Pages | 157-161 |
Number of pages | 5 |
ISBN (Electronic) | 9781577357599 |
State | Published - 2016 |
Externally published | Yes |
Event | 30th AAAI Conference on Artificial Intelligence, AAAI 2016 - Phoenix, United States Duration: Feb 12 2016 → Feb 17 2016 |
Publication series
Name | AAAI Workshop - Technical Report |
---|---|
Volume | WS-16-01 - WS-16-15 |
Other
Other | 30th AAAI Conference on Artificial Intelligence, AAAI 2016 |
---|---|
Country/Territory | United States |
City | Phoenix |
Period | 2/12/16 → 2/17/16 |
Bibliographical note
Publisher Copyright:Copyright © 2016, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved.