Intrusion detection and the role of the system administrator

被引:7
作者
Sommestad, Teodor [1 ]
Hunstad, Amund [1 ]
机构
[1] Swedish Defence Research Agency (FOI), Linköping
来源
Information Management and Computer Security | 2013年 / 21卷 / 01期
关键词
Computer networks; Computer security; Information management; Intrusion detection; Intrusion detection systems; System administration; System administrator;
D O I
10.1108/09685221311314400
中图分类号
学科分类号
摘要
Purpose - The expertise of a system administrator is believed to be important for effective use of intrusion detection systems (IDS). This paper examines two hypotheses concerning the system administrators' ability to filter alarms produced by an IDS by comparing the performance of an IDS to the performance of a system administrator using the IDS. Design/methodology/approach - An experiment was constructed where five computer networks are attacked during four days. The experiment assessed difference made between the output of a system administrator using an IDS and the output of the IDS alone. The administrator's analysis process was also investigated through interviews. Findings - The experiment shows that the system administrator analysing the output from the IDS significantly improves the portion of alarms corresponding to attacks, without decreasing the probability that an attack is detected significantly. In addition, an analysis is made of the types of expertise that is used when output from the IDS is processed by the administrator. Originality/value - Previous work, based on interviews with system administrators, has suggested that competent system administrators are important in order to achieve effective IDS solutions. This paper presents a quantitative test of the value system administrators add to the intrusion detection solution. © Emerald Group Publishing Limited.
引用
收藏
页码:30 / 40
页数:10
相关论文
共 16 条
  • [11] Sourour M., Adel B., Tarek A., Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives, 2009 IEEE Symposium on Computational Intelligence in Cyber Security, IEEE, pp. 107-114, (2009)
  • [12] Spathoulas G.P., Katsikas S.K., Reducing false positives in intrusion detection systems, Computers & Security, 29, 1, pp. 35-44, (2010)
  • [13] Thompson R.S., Rantanen E.M., Yurcik W., Bailey B.P., Command line or pretty lines? Comparing textual and visual interfaces for intrusion detection, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, (2007)
  • [14] Werlinger R., Hawkey K., Muldner K., The challenges of using an intrusion detection system: Is it worth the effort?, SOUPS '08 Proceedings of the 4th Symposium on Usable Privacy and Security, (2008)
  • [15] Werlinger R., Muldner K., Hawkey K., Beznosov K., Towards understanding diagnostic work during the detection and investigation of security incidents, Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), Lulu.com, (2009)
  • [16] Werlinger R., Muldner K., Hawkey K., Beznosov K., Preparation, detection, and analysis: The diagnostic work of IT security incident response, Information Management & Computer Security, 18, 1, pp. 26-42, (2010)