Enter your keyword

2-s2.0-85066913593

[vc_empty_space][vc_empty_space]

The decision accuracy of acquaintance list from different risk-cost analysis

Purwanto Y.a, Kuspriyantob, Hendrawanb, Rahardjo B.b

a Electrical and Telecommunication Engineering, Telkom University, Bandung, Indonesia
b School of Electrical Engineering and Informatics, Bandung Institute of Technology, Bandung, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2018 IEEE.Consultation-based Collaborative Intrusion Detection Network (CIDN) aims to improve the detection accuracy of an Intrusion Detection System (IDS). Acquaintance management has become a vital process which responsible for the acquaintance selection in CIDN. In an acquaintance management algorithm, the trustworthiness of the IDS is estimated by the used of risk-cost analysis. However, the inaccurate estimation of the risk cost value has lead to a poor acquaintance list quality. As there is more than one risk-cost analysis, it is beneficial to analyze the used of different risk-cost analysis in an acquaintance management algorithm. We implement three different risk-cost analysis in four different environments of CIDN. The result shows that in the mix component of the DDoS attack, our proposed risk-cost analysis provide higher acquaintance detection accuracy.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]CIDN,consultation,DDoS,DDoS Attack,Decision accuracies,Detection accuracy,Intrusion Detection Systems,Risk costs[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]CIDN,consultation,DDoS,IDS,risk-cost[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text]ACKNOWLEDGMENT Directorate of Research and Community Service partially supported this research, the General Directorate of Research and Development Strengthening, the Ministry of Research, Technology, and Higher Education of the Republic of Indonesia under the research contract FY 2018 No. 014/PNLT3/PPM/2018[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/TSSA.2018.8708840[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]