메뉴 건너뛰기




Volumn 195, Issue 1, 2009, Pages 186-204

The management of intrusion detection: Configuration, inspection, and investment

Author keywords

Cost and benefit analysis; Decision analysis; Decision support systems; Dynamic programming

Indexed keywords

ADMINISTRATIVE DATA PROCESSING; ALARM SYSTEMS; ARTIFICIAL INTELLIGENCE; BUDGET CONTROL; COMPUTER CRIME; COST FUNCTIONS; COSTS; DAMAGE DETECTION; DECISION MAKING; DECISION SUPPORT SYSTEMS; DECISION THEORY; EARNINGS; INFORMATION RETRIEVAL SYSTEMS; INTRUSION DETECTION; INVESTMENTS; MANAGEMENT INFORMATION SYSTEMS; PROBABILITY DENSITY FUNCTION; SECURITY OF DATA; SYSTEMS ENGINEERING; WIRELESS LOCAL AREA NETWORKS (WLAN); WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 55949086356     PISSN: 03772217     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ejor.2008.01.034     Document Type: Article
Times cited : (7)

References (19)
  • 1
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • Axelsson S. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security 3 3 (2000) 186-205
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 2
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Technical Publishing, Indianapolis, IN
    • Bace R. Intrusion Detection (2000), Macmillan Technical Publishing, Indianapolis, IN
    • (2000) Intrusion Detection
    • Bace, R.1
  • 3
    • 55949089754 scopus 로고    scopus 로고
    • Briney, A. 2001. 2001 industry survey. Information Security Magazine, October, 34-46.
    • Briney, A. 2001. 2001 industry survey. Information Security Magazine, October, 34-46.
  • 4
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems (idss) in information technology security architecture
    • Cavusoglu H., Mishra B., and Raghunathan S. The value of intrusion detection systems (idss) in information technology security architecture. Information Systems Research 16 (2005) 28-47
    • (2005) Information Systems Research , vol.16 , pp. 28-47
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 5
    • 34548502174 scopus 로고    scopus 로고
    • Configuration of detection software: A comparison of decision and game theory approaches
    • Cavusoglu H., and Raghunathan S. Configuration of detection software: A comparison of decision and game theory approaches. Decision Analysis 1 3 (2004) 131-148
    • (2004) Decision Analysis , vol.1 , Issue.3 , pp. 131-148
    • Cavusoglu, H.1    Raghunathan, S.2
  • 6
    • 55949113909 scopus 로고    scopus 로고
    • Ernst & Young 2003. Global information security survey 2003. White paper, Ernst & Young LLP.
    • Ernst & Young 2003. Global information security survey 2003. White paper, Ernst & Young LLP.
  • 9
    • 55949120510 scopus 로고    scopus 로고
    • Gordon, L.A., Loeb, M.P., Lucyshyn, W., 2005. 2005 CSI/FBI computer crime and security survey. White paper, Computer Security Institute.
    • Gordon, L.A., Loeb, M.P., Lucyshyn, W., 2005. 2005 CSI/FBI computer crime and security survey. White paper, Computer Security Institute.
  • 10
    • 2342646110 scopus 로고    scopus 로고
    • The effect of intrusion detection management methods on the return on investment
    • Iheagwara C. The effect of intrusion detection management methods on the return on investment. Computers and Security 23 3 (2004) 213-228
    • (2004) Computers and Security , vol.23 , Issue.3 , pp. 213-228
    • Iheagwara, C.1
  • 11
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • Julisch K. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security 6 4 (2003) 443-471
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.4 , pp. 443-471
    • Julisch, K.1
  • 13
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee W., and Stolfo S.J. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security 3 4 (2000) 227-261
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 15
    • 0018079655 scopus 로고
    • Basic principles of ROC analysis
    • Metz C.E. Basic principles of ROC analysis. Seminars in Nuclear Medicine 8 4 (1978) 283-298
    • (1978) Seminars in Nuclear Medicine , vol.8 , Issue.4 , pp. 283-298
    • Metz, C.E.1
  • 16
    • 55949135562 scopus 로고    scopus 로고
    • PriceWaterhouseCoopers, 2004. Information security breaches survey 2004. Technical Report, Department of Trade and Industry (DTI), United Kingdom.
    • PriceWaterhouseCoopers, 2004. Information security breaches survey 2004. Technical Report, Department of Trade and Industry (DTI), United Kingdom.
  • 17
    • 55949129743 scopus 로고    scopus 로고
    • Security gets top-level attention
    • Stein T. Security gets top-level attention. Optimize (2003) 23
    • (2003) Optimize , pp. 23
    • Stein, T.1
  • 18
    • 33746449221 scopus 로고    scopus 로고
    • A decision analysis method for evaluating computer intrusion detection systems
    • Ulvila J.W., and Gaffney Jr. J.E. A decision analysis method for evaluating computer intrusion detection systems. Decision Analysis 1 1 (2004) 39-54
    • (2004) Decision Analysis , vol.1 , Issue.1 , pp. 39-54
    • Ulvila, J.W.1    Gaffney Jr., J.E.2
  • 19
    • 0027457620 scopus 로고
    • Receiver-operating characteristic (ROC) plots: A fundamental evaluation tool in clinical medicine
    • Zweig M.H., and Campbell G. Receiver-operating characteristic (ROC) plots: A fundamental evaluation tool in clinical medicine. Clinical Chemistry 39 (1993) 561-577
    • (1993) Clinical Chemistry , vol.39 , pp. 561-577
    • Zweig, M.H.1    Campbell, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.