skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Characterization of Intrusion Detection System Performance using Design of Experiments.

Abstract

Abstract not provided.

Authors:
; ;
Publication Date:
Research Org.:
Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Sponsoring Org.:
USDOE National Nuclear Security Administration (NNSA)
OSTI Identifier:
1148106
Report Number(s):
SAND2007-3743C
522835
DOE Contract Number:
AC04-94AL85000
Resource Type:
Conference
Resource Relation:
Conference: Proposed for presentation at the INNM 48th Annual Meeting held July 8-12, 2007 in Tucson, AZ.
Country of Publication:
United States
Language:
English

Citation Formats

Mitchiner, Kim W., Snell, Mark K., and Griffin, Frank W. Characterization of Intrusion Detection System Performance using Design of Experiments.. United States: N. p., 2007. Web.
Mitchiner, Kim W., Snell, Mark K., & Griffin, Frank W. Characterization of Intrusion Detection System Performance using Design of Experiments.. United States.
Mitchiner, Kim W., Snell, Mark K., and Griffin, Frank W. Fri . "Characterization of Intrusion Detection System Performance using Design of Experiments.". United States. doi:. https://www.osti.gov/servlets/purl/1148106.
@article{osti_1148106,
title = {Characterization of Intrusion Detection System Performance using Design of Experiments.},
author = {Mitchiner, Kim W. and Snell, Mark K. and Griffin, Frank W.},
abstractNote = {Abstract not provided.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Fri Jun 01 00:00:00 EDT 2007},
month = {Fri Jun 01 00:00:00 EDT 2007}
}

Conference:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that hold this conference proceeding.

Save / Share:
  • Abstract not provided.
  • No abstract prepared.
  • The Fiber Optic Intrusion Detection System (FOIDS)1 is a physical security sensor deployed on fence lines to detect climb or cut intrusions by adversaries. Calibration of detection sensitivity can be time consuming because, for example, the FiberSenSys FD-332 has 32 settings that can be adjusted independently to provide a balance between a high probability of detection and a low nuisance alarm rate. Therefore, an efficient method of calibrating the FOIDS in the field, other than by trial and error, was needed. This study was conducted to: x Identify the most significant settings for controlling detection x Develop a way ofmore » predicting detection sensitivity for given settings x Develop a set of optimal settings for validation The Design of Experiments (DoE) 2-4 methodology was used to generate small, planned test matrixes, which could be statistically analyzed to yield more information from the test data. Design of Experiments is a statistical methodology for quickly optimizing performance of systems with measurable input and output variables. DoE was used to design custom screening experiments based on 11 FOIDS settings believed to have the most affect on WKH types of fence perimeter intrusions were evaluated: simulated cut intrusions and actual climb intrusions. Two slightly different two-level randomized fractional factorial designed experiment matrixes consisting of 16 unique experiments were performed in the field for each type of intrusion. Three repetitions were conducted for every cut test; two repetitions were conducted for every climb test. Total number of cut tests analyzed was 51; the total number of climb tests was 38. This paper discusses the results and benefits of using Design of Experiments (DoE) to calibrate and optimize the settings for a FOIDS sensor« less
  • The installation of a new intrusion detection system (IDS) is, of course, expected to improve site security. However, depending upon the way the system is used, it can, over time, actually degrade security. Proper use, control, and maintenance of the IDS is critical if site security is to be maintained. This paper discusses several operational issues that should be addressed in order to use an IDS effectively. Several anecdotes from the author`s experience are given to illustrate proper and improper use of an IDS. Improper operational use of an IDS can render it ineffective. Applying these tips can help keepmore » the IDS operating at peak performance.« less
  • The installation of a new intrusion detection system (IDS) is, of course, expected to improve site security. However, depending upon the way the system is used, it can, over time, actually degrade security. Proper use, control, and maintenance of the IDS is critical if site security is to be maintained. This paper discusses several operational issues that should be addressed in order to use an IDS effectively. Several anecdotes from the author`s experience are given to illustrate proper and improper use of an IDS. Improper operational use of an IDS can render it ineffective. Applying these tips can help keepmore » the IDS operating at peak performance.« less