EconomicsofUserSegmentationProfilingandDetectionin

上传人:marr****208 文档编号:149799538 上传时间:2020-10-30 格式:DOC 页数:34 大小:583KB
返回 下载 相关 举报
EconomicsofUserSegmentationProfilingandDetectionin_第1页
第1页 / 共34页
EconomicsofUserSegmentationProfilingandDetectionin_第2页
第2页 / 共34页
EconomicsofUserSegmentationProfilingandDetectionin_第3页
第3页 / 共34页
EconomicsofUserSegmentationProfilingandDetectionin_第4页
第4页 / 共34页
EconomicsofUserSegmentationProfilingandDetectionin_第5页
第5页 / 共34页
点击查看更多>>
资源描述

《EconomicsofUserSegmentationProfilingandDetectionin》由会员分享,可在线阅读,更多相关《EconomicsofUserSegmentationProfilingandDetectionin(34页珍藏版)》请在金锄头文库上搜索。

1、Economics of User Segmentation, Profiling, and Detection in SecurityBin MaiCollege of Business AdministrationNorthwestern State UniversityNatchitoches, LA 71497maibnsula.eduHuseyin Cavusoglu, Srinivasan Raghunathan, and Byungwan KohSchool of ManagementThe University of Texas at DallasRichardson, TX

2、75083sraghu,huseyin,byungwan.kohutdallas.eduUser profiling is regarded as an effective and efficient tool to detect security breaches because it allows firms to target attackers by deploying a more stringent detection system for them than for normal users. The absence of profiling restricts the firm

3、 to use the same detection system for all users. While profiling can be a useful tool, we show that it induces attackers to fake their identity and trick the profiling system into misclassifying their type, and that this incentive is higher if the profiling accuracy is higher. By faking, an attacker

4、 reduces the likelihood of being classified as an attacker by the profiling system; a higher profiling accuracy decreases this likelihood more. Further, a higher disparity in detection rates for attackers and normal users employed by the firm to take advantage of a higher profiling accuracy makes fa

5、king even more attractive. If faking is sufficiently easy, the profiling accuracy is sufficiently poor, or if faking degrades the profiling accuracy sufficiently, then the firm realizes a lower payoff when it uses profiling than when it does not. For profiling to offer maximum benefit, faking cost s

6、hould be higher than a threshold value, which is increasing in the profiling accuracy. If faking is not an issue, then, consistent with our intuition, it is optimal for a firm to deploy a more stringent detection system for an attacker and a less stringent detection system for a normal user when pro

7、filing accuracy improves. However, when faking is an issue, if the profiling accuracy is higher than a threshold value, then the firm should design less differentiated detection systems by degrading the detection rate for an attacker or by enhancing the detection rate for a normal user when profilin

8、g accuracy improves. May 20071. IntroductionDetection systems are an integral part of many security architectures. Metal detectors, X-ray scanners, and physical inspections are a few such systems used in aviation security. Intrusion Detection Systems (IDSs) detect hacking in computer systems. Provid

9、ing adequate and cost-effective security in domains such as aviation and information security is challenging because only a small fraction of users have any incentive to attack. Subjecting every user to a costly detection procedure is inefficient, but selecting a sub set of users randomly is likely

10、to be ineffective. If potential attackers can be identified, then it may be beneficial to employ a more rigorous detection procedure on actions of these individuals compared to those of others. Thus, user profiling, which attempts to classify users into different risk classes, is considered to be a

11、potentially useful tool in security contexts. According to Oxford English Dictionary, one of the definitions of profiling is the “selection for scrutiny by law enforcement officials, etc., based on superficial characteristics (as ethnic background or race) rather than on evidentiary criteria.” In th

12、is paper, we adopt this definition to distinguish between profiling and detection; while profiling uses criteria pertaining to individuals, detection uses criteria related to criminal behavior. For instance, in aviation security, a Computer Assisted Passenger Prescreening System (CAPPS), s profiling

13、 system in our definition, classifies passengers into different risk classes For a discussion on the history of CAPPS and its successor CAPPS II, the readers are referred to the vast literature on aviation security (e.g., McLay et al. (2005b) and the references therein) based on characteristics such

14、 as gender whereas a metal detector, a detection system, looks for evidence of metal to detect security breaches.While proponents of profiling tout its ability to offer improved detection at a lower cost, critics have pointed out that users may be able to game the profiling system through trial-and-

15、error sampling and learning. Critics have also pointed out that profiling is illegal because it is discriminatory, but we do not focus on the legality of profiling in this paper. For instance, Chakrabarti and Strauss (2002) demonstrate how a terrorist can circumvent the CAPPS and reduce his chances

16、of being detected. Dalvi et al. (2004) discuss how spammers can alter their strategies to trick spam filters in the information security context. In this paper, we analyze the problem of cost-effective design of multi-level detection systems in the presence of user profiling and potential gaming of it by attackers and seek to answer the following questions about detection systems design:When attackers have the ability to fake

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 中学教育 > 教学课件 > 高中课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号