Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems
The decision to implement an Intrusion Detection System (IDS) within an organization can result in a complicated task both from a technical point of view as well as from those that affect the cost/benefit evaluation of its use. In this decision/evaluation process, several heuristics combined with in...
- Autores:
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2020
- Institución:
- Universidad Católica de Pereira
- Repositorio:
- Repositorio Institucional - RIBUC
- Idioma:
- spa
- OAI Identifier:
- oai:repositorio.ucp.edu.co:10785/10032
- Acceso en línea:
- https://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/2015
http://hdl.handle.net/10785/10032
- Palabra clave:
- Rights
- openAccess
- License
- Derechos de autor 2021 Entre Ciencia e Ingeniería
id |
RepoRIBUC2_1841a496b63e5d9078b9b402c6195b79 |
---|---|
oai_identifier_str |
oai:repositorio.ucp.edu.co:10785/10032 |
network_acronym_str |
RepoRIBUC2 |
network_name_str |
Repositorio Institucional - RIBUC |
repository_id_str |
|
spelling |
2022-06-01T19:09:07Z2022-06-01T19:09:07Z2020-12-31https://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/201510.31908/19098367.2015http://hdl.handle.net/10785/10032The decision to implement an Intrusion Detection System (IDS) within an organization can result in a complicated task both from a technical point of view as well as from those that affect the cost/benefit evaluation of its use. In this decision/evaluation process, several heuristics combined with indicators were proposed focused mainly on the technical part of these Systems. In creating these heuristics usability, we were assisted by a framework of guidelines of outlines oriented to the challenges of implementation and design of tools to manage security in information technology (SIT). It also presents the experience of evaluating these heuristics in two intrusion detectors of the NIDS type (Network Intrusion Detection System) widely used in the field of SIT. Therefore, it aims to be a source of consultation for evaluators and Information Technology Security professionals as well as the people in charge of decision-making in the organization.La decisión de implementar en el seno de una organización un Sistema de Detección de Intrusión (IDS) puede resultar en una tarea complicada tanto del punto de vista técnico, así como de aquellos que afectan en la evaluación costo/beneficio de su uso. En este proceso de decisión/evaluación varias heurísticas combinadas con indicadores fueron propuestos focalizadas principalmente en la parte técnica de estos Sistemas. En la creación de estas heurísticas de usabilidad fuimos asistidos por un marco de trabajo (framework) de guías de delineamientos orientadas a los desafíos de implementación y diseño de herramientas para administrar la seguridad en tecnologías de la información (Security Information Technology - SIT). Expone además la experiencia de evaluar estas heurísticas en dos detectores de intrusión de tipo NIDS (Network Intrusion Detection System) ampliamente utilizados en el ámbito de SIT. Pretende por tanto ser una fuente de consulta para los evaluadores y profesionales de Seguridad de Tecnologías de la Información al igual que las personas encargadas de la toma de decisión de la organización.application/pdfspaUniversidad Católica de Pereirahttps://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/2015/1864Derechos de autor 2021 Entre Ciencia e Ingenieríahttps://creativecommons.org/licenses/by-nc/4.0/deed.es_EShttps://creativecommons.org/licenses/by-nc/4.0/deed.es_ESinfo:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Entre ciencia e ingeniería; Vol 14 No 28 (2020); 46-51Entre Ciencia e Ingeniería; Vol. 14 Núm. 28 (2020); 46-51Entre ciencia e ingeniería; v. 14 n. 28 (2020); 46-512539-41691909-8367Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection SystemsEvaluación Heurística de Usabilidad utilizando Indicadores Cualitativos para Sistemas Detectores de IntrusiónArtículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionCappo Araujo, Cristian RamónAceval Sosa, Cristian RodrigoPublication10785/10032oai:repositorio.ucp.edu.co:10785/100322025-01-27 18:59:53.275https://creativecommons.org/licenses/by-nc/4.0/deed.es_ESDerechos de autor 2021 Entre Ciencia e Ingenieríametadata.onlyhttps://repositorio.ucp.edu.coRepositorio Institucional de la Universidad Católica de Pereira - RIBUCbdigital@metabiblioteca.com |
dc.title.eng.fl_str_mv |
Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems |
dc.title.spa.fl_str_mv |
Evaluación Heurística de Usabilidad utilizando Indicadores Cualitativos para Sistemas Detectores de Intrusión |
title |
Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems |
spellingShingle |
Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems |
title_short |
Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems |
title_full |
Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems |
title_fullStr |
Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems |
title_full_unstemmed |
Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems |
title_sort |
Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems |
description |
The decision to implement an Intrusion Detection System (IDS) within an organization can result in a complicated task both from a technical point of view as well as from those that affect the cost/benefit evaluation of its use. In this decision/evaluation process, several heuristics combined with indicators were proposed focused mainly on the technical part of these Systems. In creating these heuristics usability, we were assisted by a framework of guidelines of outlines oriented to the challenges of implementation and design of tools to manage security in information technology (SIT). It also presents the experience of evaluating these heuristics in two intrusion detectors of the NIDS type (Network Intrusion Detection System) widely used in the field of SIT. Therefore, it aims to be a source of consultation for evaluators and Information Technology Security professionals as well as the people in charge of decision-making in the organization. |
publishDate |
2020 |
dc.date.issued.none.fl_str_mv |
2020-12-31 |
dc.date.accessioned.none.fl_str_mv |
2022-06-01T19:09:07Z |
dc.date.available.none.fl_str_mv |
2022-06-01T19:09:07Z |
dc.type.spa.fl_str_mv |
Artículo de revista |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.coar.none.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 |
dc.type.coarversion.none.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.driver.none.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.version.none.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
format |
http://purl.org/coar/resource_type/c_6501 |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
https://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/2015 10.31908/19098367.2015 |
dc.identifier.uri.none.fl_str_mv |
http://hdl.handle.net/10785/10032 |
url |
https://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/2015 http://hdl.handle.net/10785/10032 |
identifier_str_mv |
10.31908/19098367.2015 |
dc.language.none.fl_str_mv |
spa |
language |
spa |
dc.relation.none.fl_str_mv |
https://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/2015/1864 |
dc.rights.spa.fl_str_mv |
Derechos de autor 2021 Entre Ciencia e Ingeniería https://creativecommons.org/licenses/by-nc/4.0/deed.es_ES |
dc.rights.uri.spa.fl_str_mv |
https://creativecommons.org/licenses/by-nc/4.0/deed.es_ES |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.coar.spa.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
rights_invalid_str_mv |
Derechos de autor 2021 Entre Ciencia e Ingeniería https://creativecommons.org/licenses/by-nc/4.0/deed.es_ES http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
Universidad Católica de Pereira |
dc.source.eng.fl_str_mv |
Entre ciencia e ingeniería; Vol 14 No 28 (2020); 46-51 |
dc.source.spa.fl_str_mv |
Entre Ciencia e Ingeniería; Vol. 14 Núm. 28 (2020); 46-51 |
dc.source.por.fl_str_mv |
Entre ciencia e ingeniería; v. 14 n. 28 (2020); 46-51 |
dc.source.none.fl_str_mv |
2539-4169 1909-8367 |
institution |
Universidad Católica de Pereira |
repository.name.fl_str_mv |
Repositorio Institucional de la Universidad Católica de Pereira - RIBUC |
repository.mail.fl_str_mv |
bdigital@metabiblioteca.com |
_version_ |
1828143423230574592 |