Adaptive Intrusion Detection: A Data Mining Approach
Artificial Intelligence Review - Issues on the application of data mining
Proceedings of the 2002 ACM symposium on Applied computing
Mining intrusion detection alarms for actionable knowledge
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Snort - Lightweight Intrusion Detection for Networks
LISA '99 Proceedings of the 13th USENIX conference on System administration
An Information Visualization Framework for Intrusion Detection
CHI '04 Extended Abstracts on Human Factors in Computing Systems
A user-centered approach to visualizing network traffic for intrusion detection
CHI '05 Extended Abstracts on Human Factors in Computing Systems
Focusing on Context in Network Traffic Analysis
IEEE Computer Graphics and Applications
Proceedings of the 3rd international workshop on Visualization for computer security
Modifying first person shooter games to perform real time network monitoring and control tasks
NetGames '06 Proceedings of 5th ACM SIGCOMM workshop on Network and system support for games
Home networking and HCI: what hath god wrought?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Security practitioners in context: their activities and interactions
CHI '08 Extended Abstracts on Human Factors in Computing Systems
The challenges of using an intrusion detection system: is it worth the effort?
Proceedings of the 4th symposium on Usable privacy and security
International Journal of Human-Computer Studies
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
ICEbox: toward easy-to-use home networking
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
On the roles of policies in computer systems management
International Journal of Human-Computer Studies
Visual histories of decision processes for creative collaboration
CHI '11 Extended Abstracts on Human Factors in Computing Systems
Visual analysis of goal-directed network defense decisions
Proceedings of the 8th International Symposium on Visualization for Cyber Security
Heuristics for evaluating IT security management tools
Proceedings of the Seventh Symposium on Usable Privacy and Security
Poster: SMURFEN: a rule sharing collaborative intrusion detection network
Proceedings of the 18th ACM conference on Computer and communications security
SMURFEN: a system framework for rule sharing collaborative intrusion detection
Proceedings of the 7th International Conference on Network and Services Management
NV: Nessus vulnerability visualization for the web
Proceedings of the Ninth International Symposium on Visualization for Cyber Security
Hi-index | 0.00 |
The work of intrusion detection (ID) in accomplishing network security is complex, requiring highly sought-after expertise. While limited automation exists, the role of human ID analysts remains crucial. This paper presents the results of an exploratory field study examining the role of expertise and collaboration in ID work. Through an analysis of the common and situated expertise required in ID work, our results counter basic assumptions about its individualistic character, revealing significant distributed collaboration. Current ID support tools provide no support for this collaborative problem solving. The results of this research highlight ID as an engaging CSCW work domain, one rich with organizational insights, design challenges, and practical import.