Skip to Main Content
In recent years, the security issues on computer networks have become one of the primary concerns because the pervasiveness of computer technology has rendered computer networks to be more vulnerable to attacks than ever before. It is necessary to take corrective actions in the process of detecting surreptitious attacks to ensure proper safety of the entire system. However, effective post-intrusive actions depend on integrated efforts of experts and systems and a thorough understanding of intrusion detection processes. Therefore, this work aims to strike a balance between damages made by the intrusion and cost of response. Cost-Sensitive modeling approach will be used so as to define the cost factors involved. The prototype of the design is briefly discussed.