Proceedings of the 4th Symposium on Usable Privacy and Security 2008
DOI: 10.1145/1408664.1408679
|View full text |Cite
|
Sign up to set email alerts
|

The challenges of using an intrusion detection system

Abstract: An intrusion detection system (IDS) can be a key component of security incident response within organizations. Traditionally, intrusion detection research has focused on improving the accuracy of IDSs, but recent work has recognized the need to support the security practitioners who receive the IDS alarms and investigate suspected incidents. To examine the challenges associated with deploying and maintaining an IDS, we analyzed 9 interviews with IT security practitioners who have worked with IDSs and performed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0
3

Year Published

2008
2008
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 42 publications
(33 citation statements)
references
References 25 publications
0
30
0
3
Order By: Relevance
“…Coping with the existing tools and their lack of usability: Current technical tools suffer from a high number of false positives, the need for precise information that is rarely documented, and a lack of usability (Werlinger, 2010(Werlinger, , 2008Metzger et al, 2011).…”
Section: Information Security Incident Managementmentioning
confidence: 99%
“…Coping with the existing tools and their lack of usability: Current technical tools suffer from a high number of false positives, the need for precise information that is rarely documented, and a lack of usability (Werlinger, 2010(Werlinger, , 2008Metzger et al, 2011).…”
Section: Information Security Incident Managementmentioning
confidence: 99%
“…Anomaly based IDS could detect unknown attacks that do not conform to the normal behaviour. However, an anomaly based IDS has a high level of false alarms due to uncertainty associated with their detection decisions [Werlinger 2008] [Gates 2006]. Therefore, a hybrid architecture for Home-IPS is proposed that combines both advantages of signature based and anomaly based IDSs.…”
Section: Home-ips Framework Architecturementioning
confidence: 99%
“…Make configuration manageable [3,20] Support rehearsal and planning [3,6,7,20,44] Make configuration easy to change [20,46] Provide meaningful errors [20,34,46] Specificity Figure 1: Framework of design guidelines for IT security management tools well supported by available tools [8,26]. As one of our participants illustrated: "So the vendors themselves are looking at things in isolation instead of looking at it as a whole thing that needs to be addressed" (P33).…”
Section: Configuration and Deployment Guidelinesmentioning
confidence: 99%
“…To realize this, tools should provide commented configuration files and/or group related parameters together in high-level profiles [20], so that a change in the profile would change all related parameters automatically. Also, tools should provide a quick tuning option that allows batch configuration of parameters [46].…”
Section: Make Configuration Easy To Changementioning
confidence: 99%