Title

Can Intrusion Detection Implementation be Adapted to End-User Capabilities?

Document Type

Conference Proceeding

Faculty

Computing, Health and Science

School

Computer and Information Science, Centre for Security Research

RAS ID

5949

Comments

This article was originally published as: Williams, P. & Matthew, R. (2008). Can intrusion detection implementation be adapted to end-user capabilities?. Proceedings of the 6th Australian Information Security Management Conference, (pp. 145-154). Perth, Western Australia. : SECAU _ Security Research Centre, ECU. Original article available here

Abstract

In an environment where technical solutions for securing networked systems are commonplace, there still exist problems in implementation of such solutions f or home and small business users. One component of this protection is the use of intrusion detection systems. Intrusion detection monitors network traffic for suspicious activity, performs access blocking and alerts the system administrator or user of potential attacks. This paper reviews the basic function of intrusion detection systems and maps them to an existing end-llser capability framework. Using this framework, implementation guidance and systematic improvement in implementation of this security measure are defined.

This document is currently not available here.

 
COinS