Can Intrusion Detection Implementation be Adapted to End-User Capabilities?

Document Type

Conference Proceeding

Faculty

Faculty of Computing, Health and Science

School

School of Computer and Information Science / Centre for Security Research

RAS ID

5949

Comments

Williams, P. & Matthew, R. (2008). Can intrusion detection implementation be adapted to end-user capabilities?. Proceedings of the 6th Australian Information Security Management Conference, (pp. 145-154). Perth, Western Australia. : SECAU _ Security Research Centre, ECU. Available here

Abstract

In an environment where technical solutions for securing networked systems are commonplace, there still exist problems in implementation of such solutions f or home and small business users. One component of this protection is the use of intrusion detection systems. Intrusion detection monitors network traffic for suspicious activity, performs access blocking and alerts the system administrator or user of potential attacks. This paper reviews the basic function of intrusion detection systems and maps them to an existing end-llser capability framework. Using this framework, implementation guidance and systematic improvement in implementation of this security measure are defined.

DOI

10.4225/75/57b56702b8775

Access Rights

Free_to_read

Share

 
COinS
 

Link to publisher version (DOI)

10.4225/75/57b56702b8775