Domain Specific Intended Use Evaluation Method: Intrusion Detection Specific Intended Use Evaluation Method

  • Authors:
  • Albert Park

  • Affiliations:
  • Center for Information Security Technologies (CIST), Department of Computer Science and Engineering Korea Univ., 5ga Anam-dong Sungbuk-gu Seoul, Korea

  • Venue:
  • ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Intrusion Detection (ID) specific intended use evaluation method is a rare and much needed usability study in ID field. It investigates only the most important or frequently faced activities that are discovered through field studies, surveys, interviews, and other previously conducted researches. This research effort aims to capture ID analysts' first order needs and tailor the criteria according to the needs. The goal of this evaluation is to learn Intrusion Detection Systems' (IDS's) potential strength and limitation towards these needs. This research presents detailed descriptions of evaluation methodology, procedures, and the rationales behind the criteria. It considers the whole aspects of ID work, including their daily routines, monitoring tasks, and the corresponding activities.