Can Intrusion Detection Implementation be Adapted to End-User Capabilities?
Document Type
Conference Proceeding
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Information Science / Centre for Security Research
RAS ID
5949
Abstract
In an environment where technical solutions for securing networked systems are commonplace, there still exist problems in implementation of such solutions f or home and small business users. One component of this protection is the use of intrusion detection systems. Intrusion detection monitors network traffic for suspicious activity, performs access blocking and alerts the system administrator or user of potential attacks. This paper reviews the basic function of intrusion detection systems and maps them to an existing end-llser capability framework. Using this framework, implementation guidance and systematic improvement in implementation of this security measure are defined.
DOI
10.4225/75/57b56702b8775
Access Rights
Free_to_read
Comments
Williams, P. & Matthew, R. (2008). Can intrusion detection implementation be adapted to end-user capabilities?. Proceedings of the 6th Australian Information Security Management Conference, (pp. 145-154). Perth, Western Australia. : SECAU _ Security Research Centre, ECU. Available here