메뉴 건너뛰기




Volumn 16, Issue 1, 2005, Pages 28-46

The value of intrusion detection systems in information technology security architecture

Author keywords

Economics of IT security; Intrusion detection systems (IDSs); IT security management; ROC curves; Security configuration

Indexed keywords

COMPUTER CRIME; COMPUTER SYSTEM FIREWALLS; ECONOMICS; INDUSTRIAL MANAGEMENT; INFORMATION TECHNOLOGY; LAWS AND LEGISLATION; SECURITY OF DATA; SOCIETIES AND INSTITUTIONS;

EID: 18944385964     PISSN: 10477047     EISSN: None     Source Type: Journal    
DOI: 10.1287/isre.1050.0041     Document Type: Article
Times cited : (180)

References (85)
  • 1
    • 18944381640 scopus 로고    scopus 로고
    • Intrusion detection fly-off: Implications for the United States Navy
    • McLean, VA
    • Aguirre, S. J., W. H. Hill. 1997. Intrusion detection fly-off: Implications for the United States Navy. MITRE Technical Report MTR 97W096, McLean, VA.
    • (1997) MITRE Technical Report , vol.MTR 97W096
    • Aguirre, S.J.1    Hill, W.H.2
  • 2
    • 0003914522 scopus 로고    scopus 로고
    • State of the practice of intrusion detection technologies
    • Pittsburgh, PA
    • Allen, J., A. Christie, W. Fithen, J. McHugh, J. Pickel, E. Stoner. 2000. State of the practice of intrusion detection technologies. Technical Report CMU/SEI-99-TR-028 ESC-99-028, Pittsburgh, PA.
    • (2000) Technical Report , vol.CMU-SEI-99-TR-028 ESC-99-028
    • Allen, J.1    Christie, A.2    Fithen, W.3    McHugh, J.4    Pickel, J.5    Stoner, E.6
  • 3
    • 84876655613 scopus 로고    scopus 로고
    • As e-tailing booms on the net, so does the demand for virtual security
    • Alpert, B. 1999. As e-tailing booms on the net, so does the demand for virtual security. Barren's 79(4) 25.
    • (1999) Barren's , vol.79 , Issue.4 , pp. 25
    • Alpert, B.1
  • 5
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • Axelsson, S. 2000. The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inform. System Security 3(3) 186-205.
    • (2000) ACM Trans. Inform. System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 7
    • 0001049795 scopus 로고
    • Agency research in managerial accounting: A survey
    • Baiman, S. 1982. Agency research in managerial accounting: A survey. J. Accounting Literature 1154-213.
    • (1982) J. Accounting Literature , vol.1 , pp. 154-213
    • Baiman, S.1
  • 8
    • 0002638023 scopus 로고    scopus 로고
    • Securing network software applications: Introduction
    • Bashir, I, E. Serafini, K. Wall. 2001. Securing network software applications: Introduction. Comm. ACM. 44(2) 28-30.
    • (2001) Comm. ACM. , vol.44 , Issue.2 , pp. 28-30
    • Bashir, I.1    Serafini, E.2    Wall, K.3
  • 9
    • 0000787258 scopus 로고
    • Crime and punishment: An economic approach
    • Becker, G. 1968. Crime and punishment: An economic approach. J. Political Econom. 76 169-217.
    • (1968) J. Political Econom. , vol.76 , pp. 169-217
    • Becker, G.1
  • 10
    • 84876600460 scopus 로고    scopus 로고
    • CERT Security Improvement Modules, Pittsburgh, PA
    • CERT (Computer Emergency and Response Team). 2000. Detecting Signs of Intrusion. CERT Security Improvement Modules, Pittsburgh, PA.
    • (2000) Detecting Signs of Intrusion
  • 12
    • 0023294428 scopus 로고
    • An intrusion detection model
    • Denning, D. E. 1987. An intrusion detection model. IEEE Trans. Software Engrg. 13(2) 222-232.
    • (1987) IEEE Trans. Software Engrg. , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 13
    • 0034430485 scopus 로고    scopus 로고
    • Reflections on cyberweapons controls
    • Denning, D. E. 2000. Reflections on cyberweapons controls. Comput. Security J. 16(4) 43-53.
    • (2000) Comput. Security J. , vol.16 , Issue.4 , pp. 43-53
    • Denning, D.E.1
  • 14
    • 0029718285 scopus 로고    scopus 로고
    • An immunological approach to change detection: Algorithms, analysis, and implications
    • D'haeseleer, P., S. Forrest, P. Helman. 1996. An immunological approach to change detection: Algorithms, analysis, and implications. Proc. IEEE Sympos. Security Privacy, 110-119.
    • (1996) Proc. IEEE Sympos. Security Privacy , pp. 110-119
    • D'haeseleer, P.1    Forrest, S.2    Helman, P.3
  • 15
    • 84966620150 scopus 로고    scopus 로고
    • Testing and evaluating computer intrusion detection systems
    • Durst, R., T. Champion, B. Witten, E. Miller, L. Spagnuolo. 1999. Testing and evaluating computer intrusion detection systems. Comm. ACM 42(7) 53-61.
    • (1999) Comm. ACM , vol.42 , Issue.7 , pp. 53-61
    • Durst, R.1    Champion, T.2    Witten, B.3    Miller, E.4    Spagnuolo, L.5
  • 16
    • 0000057794 scopus 로고
    • Optimal monitoring policies in agencies
    • Dye, R. A. 1986. Optimal monitoring policies in agencies. RAND J. Econom. 17 339-350.
    • (1986) RAND J. Econom. , vol.17 , pp. 339-350
    • Dye, R.A.1
  • 18
    • 3943113723 scopus 로고
    • A differential games solution to a model of competition between a thief and the police
    • Feichtinger, G. 1983. A differential games solution to a model of competition between a thief and the police. Management Sci. 29 686-699.
    • (1983) Management Sci. , vol.29 , pp. 686-699
    • Feichtinger, G.1
  • 19
    • 0001936936 scopus 로고
    • Strategic considerations in auditing
    • Fellingham, J. C., P. Newman. 1985. Strategic considerations in auditing. Accounting Rev. 60(4) 634-650.
    • (1985) Accounting Rev. , vol.60 , Issue.4 , pp. 634-650
    • Fellingham, J.C.1    Newman, P.2
  • 24
    • 84876617592 scopus 로고    scopus 로고
    • Hype cycle for information security
    • (May 30), Stamford, CT
    • Gartner. 2003. Hype cycle for information security. Gartner Research Report (May 30), Stamford, CT.
    • (2003) Gartner Research Report
    • Gartner1
  • 26
    • 84899413556 scopus 로고    scopus 로고
    • The emerging consensus on criminal conduct in Cyberspace
    • Goodman, M. D., S. W. Brenner. 2002. The emerging consensus on criminal conduct in Cyberspace. UCLA J. Law Tech. (3).
    • (2002) UCLA J. Law Tech. , Issue.3
    • Goodman, M.D.1    Brenner, S.W.2
  • 27
    • 0000725056 scopus 로고
    • Games with incomplete information played by Bayesian players, I: Basic model
    • Hansanyi, J. C. 1967. Games with incomplete information played by Bayesian players, I: Basic model. Management Sci. 14(3) 159-182.
    • (1967) Management Sci. , vol.14 , Issue.3 , pp. 159-182
    • Hansanyi, J.C.1
  • 28
    • 0000725055 scopus 로고
    • Games with incomplete information played by Bayesian players, II: Bayesian equilibrium points
    • Hansanyi, J. C. 1968a. Games with incomplete information played by Bayesian players, II: Bayesian equilibrium points. Management Sci. 14(5) 320-334.
    • (1968) Management Sci. , vol.14 , Issue.5 , pp. 320-334
    • Hansanyi, J.C.1
  • 29
    • 0000725056 scopus 로고
    • Games with incomplete information played by Bayesian players, III: The basic probability distribution of the game
    • Hansanyi, J. C. 1968b. Games with incomplete information played by Bayesian players, III: The basic probability distribution of the game. Management Sci. 14(7) 486-502.
    • (1968) Management Sci. , vol.14 , Issue.7 , pp. 486-502
    • Hansanyi, J.C.1
  • 30
    • 84876647994 scopus 로고    scopus 로고
    • Businesses keep spending on security
    • January 28
    • Hulme, H. 2002. Businesses keep spending on security. Inform. Week (January 28).
    • (2002) Inform. Week
    • Hulme, H.1
  • 31
    • 0003892692 scopus 로고
    • Master's thesis, Computer Science Department, University of California at Santa Barbara, CA
    • Ilgun, K. 1992. Ustat: A real-time intrusion detection system for Unix. Master's thesis, Computer Science Department, University of California at Santa Barbara, CA.
    • (1992) Ustat: A Real-time Intrusion Detection System for Unix
    • Ilgun, K.1
  • 32
    • 84876623087 scopus 로고    scopus 로고
    • The truth about false positives
    • Internet Security Systems, Atlanta, GA
    • Internet Security Systems. 2001. The truth about false positives. Technical White Paper, Internet Security Systems, Atlanta, GA.
    • (2001) Technical White Paper
  • 34
    • 0000217428 scopus 로고
    • Stochastic and moral hazard
    • Kanodia, C. S. 1985. Stochastic and moral hazard. J. Accounting Res. 23 175-193.
    • (1985) J. Accounting Res. , vol.23 , pp. 175-193
    • Kanodia, C.S.1
  • 35
    • 84933492427 scopus 로고
    • Site selection for on-site inspection in arms control
    • Kilgour, D. M. 1992. Site selection for on-site inspection in arms control. Arms Control 13(13) 439-462.
    • (1992) Arms Control , vol.13 , Issue.13 , pp. 439-462
    • Kilgour, D.M.1
  • 36
    • 84876622176 scopus 로고    scopus 로고
    • Who are hackers, anyway?
    • Koerner, B. I. 1999. Who are hackers, anyway? U.S. News World Rep. 17(2) 53.
    • (1999) U.S. News World Rep. , vol.17 , Issue.2 , pp. 53
    • Koerner, B.I.1
  • 37
    • 34548807057 scopus 로고    scopus 로고
    • A pattern matching model for misuse intrusion detection
    • Purdue University, West Lafayette, IN
    • Kumar, S., E. Spafford. 1996. A pattern matching model for misuse intrusion detection. The COAST Project, Purdue University, West Lafayette, IN.
    • (1996) The COAST Project
    • Kumar, S.1    Spafford, E.2
  • 38
    • 0036093229 scopus 로고    scopus 로고
    • Toward cost-sensitive modeling for intrusion detection and response
    • Lee, W., W. Fan, M. Miller, S. Stolfo, E. Zadok. 2002. Toward cost-sensitive modeling for intrusion detection and response. J. Comput. Security 10(1/2) 5-22.
    • (2002) J. Comput. Security , vol.10 , Issue.1-2 , pp. 5-22
    • Lee, W.1    Fan, W.2    Miller, M.3    Stolfo, S.4    Zadok, E.5
  • 42
    • 0027609384 scopus 로고
    • A survey of intrusion detection systems
    • Lunt, T. 1993. A survey of intrusion detection systems. Comput. Security 12 405-418.
    • (1993) Comput. Security , vol.12 , pp. 405-418
    • Lunt, T.1
  • 45
    • 11644268379 scopus 로고
    • A price leadership method for solving the inspector's non-constant-sum game
    • Maschler, M. 1966. A price leadership method for solving the inspector's non-constant-sum game. Naval Res. Logist. Quart. 13 11-33.
    • (1966) Naval Res. Logist. Quart. , vol.13 , pp. 11-33
    • Maschler, M.1
  • 46
    • 18944383709 scopus 로고
    • The inspector's non-constant-sum game: Its dependence on a system of detectors
    • Maschler, M. 1967. The inspector's non-constant-sum game: Its dependence on a system of detectors. Naval Res. Logist. Quart. 14 275-290.
    • (1967) Naval Res. Logist. Quart. , vol.14 , pp. 275-290
    • Maschler, M.1
  • 47
    • 12244259566 scopus 로고    scopus 로고
    • Sun Microsystems Press, Santa Clara, CA
    • McCarthy, L. 1998. Intranet Security. Sun Microsystems Press, Santa Clara, CA.
    • (1998) Intranet Security
    • McCarthy, L.1
  • 48
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • McHugh, J. 2000. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans. Inform. System Security 3(4) 262-294.
    • (2000) ACM Trans. Inform. System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 49
    • 0034270431 scopus 로고    scopus 로고
    • Defending yourself: The role of intrusion detection systems
    • McHugh, J., A. C. Christie, J. Allen. 2000. Defending yourself: The role of intrusion detection systems. IEEE Software 17(5) 42-51.
    • (2000) IEEE Software , vol.17 , Issue.5 , pp. 42-51
    • McHugh, J.1    Christie, A.C.2    Allen, J.3
  • 51
    • 84876595226 scopus 로고    scopus 로고
    • Getting the drop on network intruders
    • October 4
    • Messmer, E. 1999. Getting the drop on network intruders. Network World (October 4).
    • (1999) Network World
    • Messmer, E.1
  • 52
    • 0031161247 scopus 로고    scopus 로고
    • Environmental regulations and incentives for compliance audits
    • Mishra, B. K., P. Newman, C. Stinson. 1997. Environmental regulations and incentives for compliance audits J. Accounting Public Policy 16(2) 187-214.
    • (1997) J. Accounting Public Policy , vol.16 , Issue.2 , pp. 187-214
    • Mishra, B.K.1    Newman, P.2    Stinson, C.3
  • 54
    • 0000028277 scopus 로고
    • Monitoring vis-à-vis investigation in enforcement of law
    • Mookherjee, D., I. P. L. Png. 1992. Monitoring vis-à-vis investigation in enforcement of law. Amer. Econom. Rev. 82(3) 556-565.
    • (1992) Amer. Econom. Rev. , vol.82 , Issue.3 , pp. 556-565
    • Mookherjee, D.1    Png, I.P.L.2
  • 55
    • 3543130426 scopus 로고    scopus 로고
    • Dragon claws its way to the top
    • Mueller, P., G. Shipley. 2001. Dragon claws its way to the top. Network Comput. 20(August) 45-67.
    • (2001) Network Comput. , vol.20 , Issue.AUGUST , pp. 45-67
    • Mueller, P.1    Shipley, G.2
  • 56
    • 18944377817 scopus 로고
    • NCSC-TG-001, Version 2 June, The Rainbow Series, Meade, MD
    • National Computer Security Center. 1988. A Guide to Understanding Audit in Trusted Systems. NCSC-TG-001, Version 2 June), The Rainbow Series, Meade, MD.
    • (1988) A Guide to Understanding Audit in Trusted Systems
  • 59
    • 0038562418 scopus 로고    scopus 로고
    • NIST Publication 800-12. National Institute of Standards and Technology, Gaithersburg, MD
    • NIST Publication 800-12. 1996. An Introduction to Computer Security. National Institute of Standards and Technology, Gaithersburg, MD.
    • (1996) An Introduction to Computer Security
  • 60
    • 84876619171 scopus 로고    scopus 로고
    • Evaluating intrusion detection systems without attacking your friends
    • Northcutt, S. 1999. Evaluating intrusion detection systems without attacking your friends. Network Intrusion Detection 86.
    • (1999) Network Intrusion Detection , pp. 86
    • Northcutt, S.1
  • 61
    • 3543064959 scopus 로고    scopus 로고
    • Ed. 2. Oakwood House, Wennington, Cambridgeshire, UK (December)
    • NSS Group. 2001. Intrusion Detection Systems Group Test, Ed. 2. Oakwood House, Wennington, Cambridgeshire, UK (December).
    • (2001) Intrusion Detection Systems Group Test
  • 64
    • 84977413772 scopus 로고
    • The optimal trade-off between the probability and magnitude of fines
    • Polinsky, A., S. Shavell. 1979. The optimal trade-off between the probability and magnitude of fines. Amer. Econom. Rev. 69 880-891.
    • (1979) Amer. Econom. Rev. , vol.69 , pp. 880-891
    • Polinsky, A.1    Shavell, S.2
  • 65
    • 84873309550 scopus 로고
    • Penetration state transition analysis: A rule-based intrusion detection approach
    • Conf., San Antonio, TX
    • Porras, P., R. Kemmerer. 1992. Penetration state transition analysis: A rule-based intrusion detection approach. IEEE 8th Annual Comput. Security Appl. Conf., San Antonio, TX, 220-229.
    • (1992) IEEE 8th Annual Comput. Security Appl. , pp. 220-229
    • Porras, P.1    Kemmerer, R.2
  • 66
    • 0002629036 scopus 로고    scopus 로고
    • Emerald: Event monitoring enabling responses to anomalous live disturbances
    • Baltimore, MD
    • Porras, P., P. Neumann. 1997. Emerald: Event monitoring enabling responses to anomalous live disturbances. Proc. 20th Nat. Inform. Systems Security Conf., Baltimore, MD, 353-365.
    • (1997) Proc. 20th Nat. Inform. Systems Security Conf. , pp. 353-365
    • Porras, P.1    Neumann, P.2
  • 67
    • 0042484572 scopus 로고    scopus 로고
    • CSI/FBI computer crime and security survey
    • Power, R. 2002. CSI/FBI computer crime and security survey. Comput. Security Isssues Trends 8(1) 1-22.
    • (2002) Comput. Security Isssues Trends , vol.8 , Issue.1 , pp. 1-22
    • Power, R.1
  • 70
    • 3643079262 scopus 로고    scopus 로고
    • A software platform for testing intrusion detection systems
    • Puketza, N., M. Chung, R. O. Olsson, B. Mukherjee. 1997. A software platform for testing intrusion detection systems. IEEE Software 14(5) 43-51.
    • (1997) IEEE Software , vol.14 , Issue.5 , pp. 43-51
    • Puketza, N.1    Chung, M.2    Olsson, R.O.3    Mukherjee, B.4
  • 71
    • 0034204627 scopus 로고    scopus 로고
    • Hackers then and now: Answers to some perennial questions
    • Rothke, B. 2000. Hackers then and now: Answers to some perennial questions. Comput. Security J. 16(3) 11-14.
    • (2000) Comput. Security J. , vol.16 , Issue.3 , pp. 11-14
    • Rothke, B.1
  • 73
    • 0025620699 scopus 로고
    • Game models for structuring monitoring and enforcement systems
    • Russell, G. S. 1990. Game models for structuring monitoring and enforcement systems. Natural Resource Modeling 4 143-173.
    • (1990) Natural Resource Modeling , vol.4 , pp. 143-173
    • Russell, G.S.1
  • 74
    • 0042085672 scopus 로고
    • Optimal pilfering policies for dynamic continuous thieves
    • Sethi, S. P. 1979. Optimal pilfering policies for dynamic continuous thieves. Management Sci. 25(6) 535-542.
    • (1979) Management Sci. , vol.25 , Issue.6 , pp. 535-542
    • Sethi, S.P.1
  • 75
    • 84935455314 scopus 로고
    • Specific versus general enforcement of the law
    • Shavell, S. 1991. Specific versus general enforcement of the law. J. Political Econom. 99 1088-1108
    • (1991) J. Political Econom. , vol.99 , pp. 1088-1108
    • Shavell, S.1
  • 77
    • 1542386294 scopus 로고    scopus 로고
    • ISS RealSecure pushes past newer IDS players
    • May 17
    • Shipley, G. 1999. ISS RealSecure pushes past newer IDS players. Network Comput. (May 17).
    • (1999) Network Comput.
    • Shipley, G.1
  • 78
    • 84876604153 scopus 로고    scopus 로고
    • Blocking virus requests in Novell bordermanager's HTTP accelerator
    • Novell Appnotes, Waltham, MA
    • Sriram, T. 2002. Blocking virus requests in Novell bordermanager's HTTP accelerator. Feature article, Novell Appnotes, Waltham, MA.
    • (2002) Feature Article
    • Sriram, T.1
  • 79
    • 0000975826 scopus 로고
    • The optimum enforcement of laws
    • Stigler, G. 1970. The optimum enforcement of laws. J. Political Econom. 78 526-536.
    • (1970) J. Political Econom. , vol.78 , pp. 526-536
    • Stigler, G.1
  • 80
    • 0000064294 scopus 로고
    • An infiltration game with time dependent payoff
    • Thomas, M. U., Y. Nisgav. 1976. An infiltration game with time dependent payoff. Naval Res. Logist. Quart. 23 297-302.
    • (1976) Naval Res. Logist. Quart. , vol.23 , pp. 297-302
    • Thomas, M.U.1    Nisgav, Y.2
  • 83
    • 2742611322 scopus 로고
    • Deterrence and the design of treaty verification systems
    • Weissenberger, S. 1992. Deterrence and the design of treaty verification systems. IEEE Trans. Systems, Man, Cybernetics 22 903-915.
    • (1992) IEEE Trans. Systems, Man, Cybernetics , vol.22 , pp. 903-915
    • Weissenberger, S.1
  • 84
    • 18944408167 scopus 로고    scopus 로고
    • Intrusion battleground evolves
    • October 8
    • Yocom, B., K. Brown. 2001. Intrusion Battleground Evolves. Network World (October 8) 53-62.
    • (2001) Network World , pp. 53-62
    • Yocom, B.1    Brown, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.