1,162 research outputs found

    A Controlled Experiment on the Impact of Intrusion Detection False Alarm Rate on Analyst Performance

    Full text link
    Organizations use intrusion detection systems (IDSes) to identify harmful activity among millions of computer network events. Cybersecurity analysts review IDS alarms to verify whether malicious activity occurred and to take remedial action. However, IDS systems exhibit high false alarm rates. This study examines the impact of IDS false alarm rate on human analyst sensitivity (probability of detection), precision (positive predictive value), and time on task when evaluating IDS alarms. A controlled experiment was conducted with participants divided into two treatment groups, 50% IDS false alarm rate and 86% false alarm rate, who classified whether simulated IDS alarms were true or false alarms. Results show statistically significant differences in precision and time on task. The median values for the 86% false alarm rate group were 47% lower precision and 40% slower time on task than the 50% false alarm rate group. No significant difference in analyst sensitivity was observed.Comment: 8 pages, 4 figure

    Folk Risk Analysis: Factors Influencing Security Analysts’ Interpretation of Risk

    Get PDF
    There are several standard approaches to risk analysis recommended for use in information security, however, the actual application of risk analysis by security analysts follows an opaque mix of standard risk analysis procedures and adaptations based on an analyst’s understanding of risk. We refer to these approaches as Folk Risk Analysis. To understand folk risk analysis, we present the results of a study where Distributed Cognition and Grounded Theory were used to elicit factors influencing risk interpretation by security analysts, and the constrained conditions to risk decision making they encounter

    Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice

    Get PDF
    Security practitioners working in Security Operations Centres (SOCs) are responsible for detecting and mitigating malicious computer-network activity. This work requires both automated tools that detect and prevent attacks, and data-presentation tools that can present pertinent network-security monitoring information to practitioners in an efficient and comprehensible manner. In recent years, advances have been made in the development of visual approaches to data presentation, with some uptake of advanced security visualization tools in SOCs. Sonification, in which data is represented as sound, is said to have potential as an approach that could work alongside existing visual data-presentation approaches to address some of the unique challenges faced by SOCs. For example, sonification has been shown to enable peripheral monitoring of processes, which could aid practitioners multitasking in busy SOCs. The perspectives of security practitioners on incorporating sonification into their actual working environments have not yet been examined, however. The aim of this paper therefore is to address this gap by exploring attitudes to using sonification in SOCs, and identifying the data-presentation approaches currently used. We report on the results of a study consisting of an online survey (N=20) and interviews (N=21) with security practitioners working in a range of different SOCs. Our contributions are (1) a refined appreciation of the contexts in which sonification could aid in SOC working practice, (2) an understanding of the areas in which sonification may not be beneficial or may even be problematic, (3) an analysis of the critical requirements for the design of sonification systems and their integration into the SOC setting, and (4) evidence of the visual data-presentation techniques currently used and identification of how sonification might work alongside and address challenges to using them. Our findings clarify insights into the potential benefits and challenges of introducing sonification to support work in this vital security-monitoring environment. Participants saw potential value in using sonification systems to aid in anomaly-detection tasks in SOCs (such as retrospective hunting), as well as in situations in which peripheral monitoring is desirable: while multitasking with multiple work tasks, or while outside of the SOC

    The AI Family: The Information Security Managers Best Frenemy?

    Get PDF
    In this exploratory study, we deliberately pull apart the Artificial from the Intelligence, the material from the human. We first assessed the existing technological controls available to Information Security Managers (ISMs) to ensure their in-depth defense strategies. Based on the AI watch taxonomy, we then discuss each of the 15 technologies and their potential impact on the transformation of jobs in the field of security (i.e., AI trainers, AI explainers and AI sustainers). Additionally, in a pilot study we collect the evaluation and the narratives of the employees (n=6) of a small financial institution in a focus group session. We particularly focus on their perception of the role of AI systems in the future of cyber security

    {DomainPrio}: {P}rioritizing Domain Name Investigations to Improve {SOC} Efficiency

    Get PDF

    Security Operations Centers: A Holistic View on Problems and Solutions

    Get PDF
    Since Security Operations Centers (SOCs) were first implemented, they have strived to protect the organization and constituency they serve from all manner of Information Technology (IT) security threats. As SOCs have evolved over time to become as effective and efficient at this as possible, they have struggled with changes and upgrades to their foundational elements of people, processes, and technology in pursuit of this mission. While most relevant literature focuses on one challenge a SOC faces, or one aspect of one problem, the authors of this paper performed a literature review to identify and discuss the top current and future challenges that SOCs face in addition to the top current and future solutions to these problems

    A Controlled Experiment on the Impact of Intrusion Detection False Alarm Rate on Analyst Performance

    Get PDF
    Organizations use intrusion detection systems (IDSes) to identify harmful activity among millions of computer network events. Cybersecurity analysts review IDS alarms to verify whether malicious activity occurred and to take remedial action. However, IDS systems exhibit high false alarm rates. This study examines the impact of IDS false alarm rate on human analyst sensitivity (probability of detection), precision (positive predictive value), and time on task when evaluating IDS alarms. A controlled experiment was conducted with participants divided into two treatment groups, 50% IDS false alarm rate and 86% false alarm rate, who classified whether simulated IDS alarms were true or false alarms. Results show statistically significant differences in precision and time on task. The median values for the 86% false alarm rate group were 47% lower precision and 40% slower time on task than the 50% false alarm rate group. No significant difference in analyst sensitivity was observed

    Strategies to Reduce Effects of Organizational Stress in Health Care Workplaces

    Get PDF
    Workplace stress has become a frequent occurrence in the race for competitive business advantage. This stress leads to negative physiological consequences in the workplace, causing productivity and profitability to suffer. The purpose of this single case study was to explore the stress management strategies that some health care business leaders used to reduce the effects of work-related stress on their employees to improve productivity. The interview process included 3 managers employed at a health care institution in Houston, Texas, with records of implementing successful strategies for mitigating the effects of workplace stress. The conceptual framework was job demands-resources model, pertinent to the research question to shape this study. Data collection occurred through: (a) face-to-face semistructured interviews, (b) document reviews including the policy and procedure manual, employee annual evaluations, returned satisfaction surveys; and (c) direct observations, using observational protocol. Using the exploratory standard data analysis process, coded input of interview transcripts produced emergent themes to reduce workplace stress including: (a) adequate work resources, (b) work-life balance, and (c) sound management responsibilities. Findings from this study indicate that business managers using these themes could mitigate some of the negative consequences of organizational stress. The data from this study may contribute to social change through conveying to healthcare functionaries anti-stress strategies, increasing community awareness, and making members of the communities healthier
    corecore