Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems

The decision to implement an Intrusion Detection System (IDS) within an organization can result in a complicated task both from a technical point of view as well as from those that affect the cost/benefit evaluation of its use. In this decision/evaluation process, several heuristics combined with in...

Full description

Autores:
Tipo de recurso:
Article of journal
Fecha de publicación:
2020
Institución:
Universidad Católica de Pereira
Repositorio:
Repositorio Institucional - RIBUC
Idioma:
spa
OAI Identifier:
oai:repositorio.ucp.edu.co:10785/10032
Acceso en línea:
https://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/2015
http://hdl.handle.net/10785/10032
Palabra clave:
Rights
openAccess
License
Derechos de autor 2021 Entre Ciencia e Ingeniería
id RepoRIBUC2_1841a496b63e5d9078b9b402c6195b79
oai_identifier_str oai:repositorio.ucp.edu.co:10785/10032
network_acronym_str RepoRIBUC2
network_name_str Repositorio Institucional - RIBUC
repository_id_str
spelling 2022-06-01T19:09:07Z2022-06-01T19:09:07Z2020-12-31https://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/201510.31908/19098367.2015http://hdl.handle.net/10785/10032The decision to implement an Intrusion Detection System (IDS) within an organization can result in a complicated task both from a technical point of view as well as from those that affect the cost/benefit evaluation of its use. In this decision/evaluation process, several heuristics combined with indicators were proposed focused mainly on the technical part of these Systems. In creating these heuristics usability, we were assisted by a framework of guidelines of outlines oriented to the challenges of implementation and design of tools to manage security in information technology (SIT). It also presents the experience of evaluating these heuristics in two intrusion detectors of the NIDS type (Network Intrusion Detection System) widely used in the field of SIT. Therefore, it aims to be a source of consultation for evaluators and Information Technology Security professionals as well as the people in charge of decision-making in the organization.La decisión de implementar en el seno de una organización un Sistema de Detección de Intrusión (IDS) puede resultar en una tarea complicada tanto del punto de vista técnico, así como de aquellos que afectan en la evaluación costo/beneficio de su uso. En este proceso de decisión/evaluación varias heurísticas combinadas con indicadores fueron propuestos focalizadas principalmente en la parte técnica de estos Sistemas. En la creación de estas heurísticas de usabilidad fuimos asistidos por un marco de trabajo (framework) de guías de delineamientos orientadas a los desafíos de implementación y diseño de herramientas para administrar la seguridad en tecnologías de la información (Security Information Technology - SIT). Expone además la experiencia de evaluar estas heurísticas en dos detectores de intrusión de tipo NIDS (Network Intrusion Detection System) ampliamente utilizados en el ámbito de SIT. Pretende por tanto ser una fuente de consulta para los evaluadores y profesionales de Seguridad de Tecnologías de la Información al igual que las personas encargadas de la toma de decisión de la organización.application/pdfspaUniversidad Católica de Pereirahttps://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/2015/1864Derechos de autor 2021 Entre Ciencia e Ingenieríahttps://creativecommons.org/licenses/by-nc/4.0/deed.es_EShttps://creativecommons.org/licenses/by-nc/4.0/deed.es_ESinfo:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Entre ciencia e ingeniería; Vol 14 No 28 (2020); 46-51Entre Ciencia e Ingeniería; Vol. 14 Núm. 28 (2020); 46-51Entre ciencia e ingeniería; v. 14 n. 28 (2020); 46-512539-41691909-8367Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection SystemsEvaluación Heurística de Usabilidad utilizando Indicadores Cualitativos para Sistemas Detectores de IntrusiónArtículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionCappo Araujo, Cristian RamónAceval Sosa, Cristian RodrigoPublication10785/10032oai:repositorio.ucp.edu.co:10785/100322025-01-27 18:59:53.275https://creativecommons.org/licenses/by-nc/4.0/deed.es_ESDerechos de autor 2021 Entre Ciencia e Ingenieríametadata.onlyhttps://repositorio.ucp.edu.coRepositorio Institucional de la Universidad Católica de Pereira - RIBUCbdigital@metabiblioteca.com
dc.title.eng.fl_str_mv Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems
dc.title.spa.fl_str_mv Evaluación Heurística de Usabilidad utilizando Indicadores Cualitativos para Sistemas Detectores de Intrusión
title Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems
spellingShingle Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems
title_short Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems
title_full Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems
title_fullStr Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems
title_full_unstemmed Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems
title_sort Usability Heuristic Evaluation Using Qualitative Indicators for Intrusion Detection Systems
description The decision to implement an Intrusion Detection System (IDS) within an organization can result in a complicated task both from a technical point of view as well as from those that affect the cost/benefit evaluation of its use. In this decision/evaluation process, several heuristics combined with indicators were proposed focused mainly on the technical part of these Systems. In creating these heuristics usability, we were assisted by a framework of guidelines of outlines oriented to the challenges of implementation and design of tools to manage security in information technology (SIT). It also presents the experience of evaluating these heuristics in two intrusion detectors of the NIDS type (Network Intrusion Detection System) widely used in the field of SIT. Therefore, it aims to be a source of consultation for evaluators and Information Technology Security professionals as well as the people in charge of decision-making in the organization.
publishDate 2020
dc.date.issued.none.fl_str_mv 2020-12-31
dc.date.accessioned.none.fl_str_mv 2022-06-01T19:09:07Z
dc.date.available.none.fl_str_mv 2022-06-01T19:09:07Z
dc.type.spa.fl_str_mv Artículo de revista
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.coar.none.fl_str_mv http://purl.org/coar/resource_type/c_6501
dc.type.coarversion.none.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.driver.none.fl_str_mv info:eu-repo/semantics/article
dc.type.version.none.fl_str_mv info:eu-repo/semantics/publishedVersion
format http://purl.org/coar/resource_type/c_6501
status_str publishedVersion
dc.identifier.none.fl_str_mv https://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/2015
10.31908/19098367.2015
dc.identifier.uri.none.fl_str_mv http://hdl.handle.net/10785/10032
url https://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/2015
http://hdl.handle.net/10785/10032
identifier_str_mv 10.31908/19098367.2015
dc.language.none.fl_str_mv spa
language spa
dc.relation.none.fl_str_mv https://revistas.ucp.edu.co/index.php/entrecienciaeingenieria/article/view/2015/1864
dc.rights.spa.fl_str_mv Derechos de autor 2021 Entre Ciencia e Ingeniería
https://creativecommons.org/licenses/by-nc/4.0/deed.es_ES
dc.rights.uri.spa.fl_str_mv https://creativecommons.org/licenses/by-nc/4.0/deed.es_ES
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.coar.spa.fl_str_mv http://purl.org/coar/access_right/c_abf2
rights_invalid_str_mv Derechos de autor 2021 Entre Ciencia e Ingeniería
https://creativecommons.org/licenses/by-nc/4.0/deed.es_ES
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Universidad Católica de Pereira
dc.source.eng.fl_str_mv Entre ciencia e ingeniería; Vol 14 No 28 (2020); 46-51
dc.source.spa.fl_str_mv Entre Ciencia e Ingeniería; Vol. 14 Núm. 28 (2020); 46-51
dc.source.por.fl_str_mv Entre ciencia e ingeniería; v. 14 n. 28 (2020); 46-51
dc.source.none.fl_str_mv 2539-4169
1909-8367
institution Universidad Católica de Pereira
repository.name.fl_str_mv Repositorio Institucional de la Universidad Católica de Pereira - RIBUC
repository.mail.fl_str_mv bdigital@metabiblioteca.com
_version_ 1828143423230574592