2009
DOI: 10.1287/isre.1080.0180
|View full text |Cite
|
Sign up to set email alerts
|

Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems

Abstract: P roper configuration of security technologies is critical to balance the needs for access and protection of information. The common practice of using a layered security architecture that has multiple technologies amplifies the need for proper configuration because the configuration decision about one security technology has ramifications for the configuration decisions about others. Furthermore, security technologies rely on each other for their operations, thereby affecting each other's contribution. In this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 74 publications
(44 citation statements)
references
References 24 publications
0
38
0
Order By: Relevance
“…Probability of detection is P D, probability of false negative is 1−P D ; Probability of false positive is P F. P D = P (classified as attacker | attacking transaction); P F = P (classified as attacker | normal transaction); [10]. Because of the inaccuracy inherent in the IDS, manual investigations from a human security expert are necessary to verify the signal given by the IDS.…”
Section: Strategies and Notationsmentioning
confidence: 99%
“…Probability of detection is P D, probability of false negative is 1−P D ; Probability of false positive is P F. P D = P (classified as attacker | attacking transaction); P F = P (classified as attacker | normal transaction); [10]. Because of the inaccuracy inherent in the IDS, manual investigations from a human security expert are necessary to verify the signal given by the IDS.…”
Section: Strategies and Notationsmentioning
confidence: 99%
“…The academic research community, in contrast, has aimed to shift focus on providing specific guidance about security investments, though in many cases this guidance is in very specific security contexts, such as whether or not to deploy a firewall or an IDS, and how to configure it if deployed [113,107,32,29,31,33]. The corresponding approaches are either decision theoretic, modeling threats as unaffected by mitigation policies [113,107,32], or game theoretic, accounting for the impact of security policies on attackers' incentives [32,29,31,33].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The corresponding approaches are either decision theoretic, modeling threats as unaffected by mitigation policies [113,107,32], or game theoretic, accounting for the impact of security policies on attackers' incentives [32,29,31,33].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In the following paragraphs, we give a brief overview of the literature on IT security before describing the methodology and the analysis sections. The IT security literature is extensive, covering such manifold topics as information sharing among peers [11], disclosure of vulnerabilities in software [16], disclosure of security breaches [23], technical capabilities against outside attacks [2] and technical capabilities against opportunistic employees [12]. Several published reviews of the ITsec literature provide comprehensive meta-analyses of technical and behavioral ITsec research [25], of the deterrence approach in compliance [8], and of the different approaches to increase employee compliance to ITsec policies [1].…”
Section: Introduction and Literature Backgroundmentioning
confidence: 99%