search collections
browse collections

99530 total results

15 results after applying filter

In all collections


Title
Description
Date

2020 September 29 Audit and Business Committee meeting presentation

2020-09-29

2020 September 29 Audit and Business Committee meeting agenda

2020-09-29

2020 September 29 Audit and Business Committee meeting materials

2020-09-29

2020 September 29 Board of Trustees meeting materials

2020-09-29

2020 September 29 Board of Trustees meeting agenda

2020-09-29

2020 September 29 Board of Trustees meeting minutes

2020-09-29

2020 September 29 Board of Trustees meeting presentation

2020-09-29

Notice of Rulemaking Hearing: Student Conduct - original filing

2020-09-29

Notice of Rulemaking Hearing: Student Conduct - revisions to original filing

2020-09-29

Notice of Rulemaking Hearing:Title IX Compliance

2020-09-29

2020 September 29 Academic and Student Affairs Committee meeting agenda

2020-09-29

2020 September 29 Academic and Student Affairs Committee meeting materials

2020-09-29

2020 September 29 Academic and Student Affairs Committee meeting presentation

2020-09-29

2020 September 29 Executive Committee meeting materials

2020-09-29

Intrusion Detection Systems (IDS) based on algorithms derived from machine learning techniques can be an effective means of defending industrial control systems (ICS). Unfortunately, the relative immaturity of these systems within the commercial marketplace is often highlighted by the data scientist and mathematician focused set of configuration options that the network operations staff are ill-equipped to select. Should the system use multiple algorithms to evaluate each flow (ensemble) or a single algorithm? Should various features (e.g. diurnal time period) be included or excluded? Should the alerting threshold be set at 3.48 or 3.65? How do each of these options really affect the security of the network to be protected? Here, a method of assessment is presented that supports the system operators in understanding the relative security implications of various IDS settings. By defining the security categories of interest and mapping exemplars to those categories, operators have a solid basis for evaluation. We provide a testing and scoring system process by which they can compare the implications of one configuration set to another while allowing them to extend the approach and incorporate institutional or operator knowledge. The results show that this assessment methodology provides a metric that, in concert with other data (e.g. false positive count) can be used to make informed decisions regarding the configuration and protection of the network. Further, we show how the testing methodology can illuminate characteristics of the IDS that may make it susceptible to defeat given certain attacker behaviors.

2020-09-29

Powered by Preservica
© Copyright 2024