Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems

被引:1
作者
Cappo, C. R. [1 ]
Aceval, C. R. [1 ]
机构
[1] Univ Nacl Asuncion, Dept Informat, Fac Politecn FP UNA, San Lorenzo, Paraguay
来源
ENTRE CIENCIA E INGENIERIA | 2020年 / 14卷 / 28期
关键词
usability heuristics; usability indicators; intrusion detection system; usability;
D O I
10.31908/19098367.2015
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The decision to implement an Intrusion Detection System (IDS) within an organization can result in a complicated task both from a technical point of view as well as from those that affect the cost/benefit evaluation of its use. In this decision/evaluation process, several heuristics combined with indicators were proposed focused mainly on the technical part of these Systems. In creating these heuristics usability, we were assisted by a framework of guidelines of outlines oriented to the challenges of implementation and design of tools to manage security in information technology (SIT). It also presents the experience of evaluating these heuristics in two intrusion detectors of the NIDS type (Network Intrusion Detection System) widely used in the field of SIT. Therefore, it aims to be a source of consultation for evaluators and Information Technology Security professionals as well as the people in charge of decision-making in the organization.
引用
收藏
页码:46 / 51
页数:6
相关论文
共 19 条
[1]  
[Anonymous], 2004, Intrusion detection and correlation: challenges and solutions
[2]  
[Anonymous], 1998, 924111 ISO
[3]   ISO 9241-11 Revised: What Have We Learnt About Usability Since 1998? [J].
Bevan, Nigel ;
Carter, James ;
Harker, Susan .
HUMAN-COMPUTER INTERACTION: DESIGN AND EVALUATION, PT I, 2015, 9169 :143-151
[4]  
Broadcom, 2019, INTERNET SECURITY TH
[5]  
Butt D. S., 2018, EFFICIENCY PROCESSES
[6]   A framework for the evaluation of intrusion detection systems [J].
Cardenas, Alvaro A. ;
Baras, John S. ;
Seamon, Karl .
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, :63-+
[7]   The value of intrusion detection systems in information technology security architecture [J].
Cavusoglu, H ;
Mishra, B ;
Raghunathan, S .
INFORMATION SYSTEMS RESEARCH, 2005, 16 (01) :28-46
[8]   Towards a taxonomy of intrusion-detection systems [J].
Debar, H ;
Dacier, M ;
Wespi, A .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08) :805-822
[9]  
Jaferian P., 2008, P 2 ACM S COMP HUM I P 2 ACM S COMP HUM I, P1, DOI DOI 10.1145/1477973.1477983
[10]   Usability: Lessons Learned ... and Yet to Be Learned [J].
Lewis, James R. .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2014, 30 (09) :663-684