Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems

The decision to implement an Intrusion Detection System (IDS) within an organization can result in a complicated task both from a technical point of view as well as from those that affect the cost/benefit evaluation of its use. In this decision/evaluation process, several heuristics combined with in...

Full description

Autores:
Tipo de recurso:
Fecha de publicación:
2020
Institución:
Universidad Católica de Pereira
Repositorio:
Repositorio Institucional - RIBUC
Idioma:
spa
OAI Identifier:
oai:repositorio.ucp.edu.co:10785/13683
Acceso en línea:
https://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/2015
http://hdl.handle.net/10785/13683
Palabra clave:
Rights
openAccess
License
Derechos de autor 2021 Entre Ciencia e Ingeniería
id RepoRIBUC_57e3b98578a27349347d208785df7b11
oai_identifier_str oai:repositorio.ucp.edu.co:10785/13683
network_acronym_str RepoRIBUC
network_name_str Repositorio Institucional - RIBUC
repository_id_str
spelling Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection SystemsEvaluación Heurística de Usabilidad utilizando Indicadores Cualitativos para Sistemas Detectores de IntrusiónThe decision to implement an Intrusion Detection System (IDS) within an organization can result in a complicated task both from a technical point of view as well as from those that affect the cost/benefit evaluation of its use. In this decision/evaluation process, several heuristics combined with indicators were proposed focused mainly on the technical part of these Systems. In creating these heuristics usability, we were assisted by a framework of guidelines of outlines oriented to the challenges of implementation and design of tools to manage security in information technology (SIT). It also presents the experience of evaluating these heuristics in two intrusion detectors of the NIDS type (Network Intrusion Detection System) widely used in the field of SIT. Therefore, it aims to be a source of consultation for evaluators and Information Technology Security professionals as well as the people in charge of decision-making in the organization.La decisión de implementar en el seno de una organización un Sistema de Detección de Intrusión (IDS) puede resultar en una tarea complicada tanto del punto de vista técnico, así como de aquellos que afectan en la evaluación costo/beneficio de su uso. En este proceso de decisión/evaluación varias heurísticas combinadas con indicadores fueron propuestos focalizadas principalmente en la parte técnica de estos Sistemas. En la creación de estas heurísticas de usabilidad fuimos asistidos por un marco de trabajo (framework) de guías de delineamientos orientadas a los desafíos de implementación y diseño de herramientas para administrar la seguridad en tecnologías de la información (Security Information Technology - SIT). Expone además la experiencia de evaluar estas heurísticas en dos detectores de intrusión de tipo NIDS (Network Intrusion Detection System) ampliamente utilizados en el ámbito de SIT. Pretende por tanto ser una fuente de consulta para los evaluadores y profesionales de Seguridad de Tecnologías de la Información al igual que las personas encargadas de la toma de decisión de la organización.Universidad Católica de Pereira2023-08-29T03:49:39Z2023-08-29T03:49:39Z2020-12-31Artículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/version/c_970fb48d4fbd8a85info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_2df8fbb1application/pdfhttps://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/201510.31908/19098367.2015http://hdl.handle.net/10785/13683Entre ciencia e ingeniería; Vol 14 No 28 (2020); 46-51Entre Ciencia e Ingeniería; Vol. 14 Núm. 28 (2020); 46-51Entre ciencia e ingeniería; v. 14 n. 28 (2020); 46-512539-41691909-8367spahttps://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/2015/1864Derechos de autor 2021 Entre Ciencia e Ingenieríahttps://creativecommons.org/licenses/by-nc/4.0/deed.es_EShttps://creativecommons.org/licenses/by-nc/4.0/deed.es_ESinfo:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Cappo Araujo, Cristian RamónAceval Sosa, Cristian Rodrigooai:repositorio.ucp.edu.co:10785/136832025-01-27T23:59:16Z
dc.title.none.fl_str_mv Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems
Evaluación Heurística de Usabilidad utilizando Indicadores Cualitativos para Sistemas Detectores de Intrusión
title Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems
spellingShingle Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems
title_short Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems
title_full Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems
title_fullStr Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems
title_full_unstemmed Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems
title_sort Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems
description The decision to implement an Intrusion Detection System (IDS) within an organization can result in a complicated task both from a technical point of view as well as from those that affect the cost/benefit evaluation of its use. In this decision/evaluation process, several heuristics combined with indicators were proposed focused mainly on the technical part of these Systems. In creating these heuristics usability, we were assisted by a framework of guidelines of outlines oriented to the challenges of implementation and design of tools to manage security in information technology (SIT). It also presents the experience of evaluating these heuristics in two intrusion detectors of the NIDS type (Network Intrusion Detection System) widely used in the field of SIT. Therefore, it aims to be a source of consultation for evaluators and Information Technology Security professionals as well as the people in charge of decision-making in the organization.
publishDate 2020
dc.date.none.fl_str_mv 2020-12-31
2023-08-29T03:49:39Z
2023-08-29T03:49:39Z
dc.type.none.fl_str_mv Artículo de revista
http://purl.org/coar/resource_type/c_6501
http://purl.org/coar/version/c_970fb48d4fbd8a85
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
status_str publishedVersion
dc.identifier.none.fl_str_mv https://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/2015
10.31908/19098367.2015
http://hdl.handle.net/10785/13683
url https://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/2015
http://hdl.handle.net/10785/13683
identifier_str_mv 10.31908/19098367.2015
dc.language.none.fl_str_mv spa
language spa
dc.relation.none.fl_str_mv https://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/2015/1864
dc.rights.none.fl_str_mv Derechos de autor 2021 Entre Ciencia e Ingeniería
https://creativecommons.org/licenses/by-nc/4.0/deed.es_ES
https://creativecommons.org/licenses/by-nc/4.0/deed.es_ES
info:eu-repo/semantics/openAccess
http://purl.org/coar/access_right/c_abf2
rights_invalid_str_mv Derechos de autor 2021 Entre Ciencia e Ingeniería
https://creativecommons.org/licenses/by-nc/4.0/deed.es_ES
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv Universidad Católica de Pereira
publisher.none.fl_str_mv Universidad Católica de Pereira
dc.source.none.fl_str_mv Entre ciencia e ingeniería; Vol 14 No 28 (2020); 46-51
Entre Ciencia e Ingeniería; Vol. 14 Núm. 28 (2020); 46-51
Entre ciencia e ingeniería; v. 14 n. 28 (2020); 46-51
2539-4169
1909-8367
institution Universidad Católica de Pereira
repository.name.fl_str_mv
repository.mail.fl_str_mv
_version_ 1844494680842043392