Skip to main content
Article thumbnail
Location of Repository

A deployment value model for intrusion detection sensors

By S. A. Shaikh, H. Chivers, P. Nobles, J. A. Clark and H. Chen

Abstract

The value of an intrusion detection sensor is often associated with its data collection and analysis features. Experience tells us such sensors fall under a range of different types and are diverse in their operational characteristics. There is a need to examine some of these characteristics to appreciate the value they add to intrusion detection deployments. This paper presents a model to determine the value derived from deploying sensors, which serves to be useful to analyse and compare intrusion detection deployments

Publisher: Springer-verlag
Year: 2010
DOI identifier: 10.1007/978-3-642-02617-1_26
OAI identifier: oai:dspace.lib.cranfield.ac.uk:1826/4249
Provided by: Cranfield CERES
Journal:

Suggested articles

Citations

  1. (2007). A cost-sensitive model for preemptive intrusion response systems. In: doi
  2. (2006). A formal approach to sensor placement and conīŦguration in a network intrusion detection system. In: doi
  3. (2002). Automated generation and analysis of attack graphs. In: doi
  4. (2008). Characterising intrusion detection sensors, part 2. doi
  5. (2008). Characterising intrusion detection sensors. doi
  6. (1993). E.: Toward cost-sensitive modeling for intrusion detection and response. doi
  7. (2008). Optimal ids sensor placement and alert prioritization using attack graphs. doi
  8. (2005). S.: The value of intrusion detection systems in information technology security architecture. doi
  9. (2006). Security Design Analysis. York Computer Science doi

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.