Can Intrusion Detection Implementation be Adapted to End-User Capabilities?

Document Type

Conference Proceeding


Computing, Health and Science


Computer and Information Science, Centre for Security Research




This article was originally published as: Williams, P. & Matthew, R. (2008). Can intrusion detection implementation be adapted to end-user capabilities?. Proceedings of the 6th Australian Information Security Management Conference, (pp. 145-154). Perth, Western Australia. : SECAU _ Security Research Centre, ECU. Original article available here


In an environment where technical solutions for securing networked systems are commonplace, there still exist problems in implementation of such solutions f or home and small business users. One component of this protection is the use of intrusion detection systems. Intrusion detection monitors network traffic for suspicious activity, performs access blocking and alerts the system administrator or user of potential attacks. This paper reviews the basic function of intrusion detection systems and maps them to an existing end-llser capability framework. Using this framework, implementation guidance and systematic improvement in implementation of this security measure are defined.