A Methodology for Testing Intrusion Detection Systems
IEEE Transactions on Software Engineering
Testing and evaluating computer intrusion detection systems
Communications of the ACM
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Security attribute evaluation method: a cost-benefit approach
Proceedings of the 24th International Conference on Software Engineering
Toward cost-sensitive modeling for intrusion detection and response
Journal of Computer Security
Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Aggregation and Correlation of Intrusion-Detection Alerts
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Mining intrusion detection alarms for actionable knowledge
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
The challenge of information visualization evaluation
Proceedings of the working conference on Advanced visual interfaces
VisFlowConnect: netflow visualizations of link relationships for security situational awareness
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Passive visual fingerprinting of network attack tools
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
NVisionIP: netflow visualizations of system state for security situational awareness
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
I know my network: collaboration and expertise in intrusion detection
CSCW '04 Proceedings of the 2004 ACM conference on Computer supported cooperative work
ACM SIGGRAPH Computer Graphics
A user-centered approach to visualizing network traffic for intrusion detection
CHI '05 Extended Abstracts on Human Factors in Computing Systems
An Information Visualization Framework for Intrusion Detection
CHI '04 Extended Abstracts on Human Factors in Computing Systems
Attacking information visualization system usability overloading and deceiving the human
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Visual Firewall: Real-time Network Security Monito
VIZSEC '05 Proceedings of the IEEE Workshops on Visualization for Computer Security
STARMINE: a visualization system for cyber attacks
APVis '06 Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation - Volume 60
Visualizations to improve reactivity towards security incidents inside corporate networks
Proceedings of the 3rd international workshop on Visualization for computer security
Aspects of Network Visualization
IEEE Computer Graphics and Applications
An Information Visualization Tool with Multiple Coordinated Views for Network Traffic Analysis
IV '08 Proceedings of the 2008 12th International Conference Information Visualisation
Intrusion detection alert verification based on multi-level fuzzy comprehensive evaluation
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
Hi-index | 0.00 |
Intrusion Detection (ID) specific intended use evaluation method is a rare and much needed usability study in ID field. It investigates only the most important or frequently faced activities that are discovered through field studies, surveys, interviews, and other previously conducted researches. This research effort aims to capture ID analysts' first order needs and tailor the criteria according to the needs. The goal of this evaluation is to learn Intrusion Detection Systems' (IDS's) potential strength and limitation towards these needs. This research presents detailed descriptions of evaluation methodology, procedures, and the rationales behind the criteria. It considers the whole aspects of ID work, including their daily routines, monitoring tasks, and the corresponding activities.