On the Perception of Risk Assessment in Intrusion Detection Systems
dc.contributor.author | Golling, Mario | |
dc.contributor.author | Koch, Robert | |
dc.contributor.author | Dreo Rodosek, Gabi | |
dc.contributor.editor | Müller, Paul | |
dc.contributor.editor | Neumair, Bernhard | |
dc.contributor.editor | Raiser, Helmut | |
dc.contributor.editor | Dreo Rodosek, Gabi | |
dc.date.accessioned | 2017-06-20T11:04:53Z | |
dc.date.available | 2017-06-20T11:04:53Z | |
dc.date.issued | 2017 | |
dc.description.abstract | Especially in the area of Intrusion Detection, the concept as well as the understanding of the term "risk" is of fundamental irnportance. Generally, risk assessment represents an important means of evaluating certain situations, plans, events or systems in a systematic and comprehensive procedure. As in other areas, within the field of IT security, the systematic assessment process (risk analysis) also aims at recomrnending how to allocate available resources. Referring to this, both, the categorization oftraffic (whether traffic has to be classified as an attack or not - "benign vs. malicious") as we11 as a corresponding estimation of the expected damage (severity) are of central importance. Therefore, within this publication, the authors address the following questions in detail: (1) To what extent are the detection results of different IDSs comparable - with regard to the assessment of the risk / extent of damage - or are there strong deviations? (2) How do both vendor-dependent and vendor-independent alerts address the topic of risk assessment and enable the implementation of a comprehensive risk concept? To this end, at the heart of this paper, an overview as weil as an evaluation of important representatives of open source IDSs is presented, focusing on methods for risk assessment resp. risk rating including cross-vendor risk rating and the Common Vulnerability Scoring System (CVSS). Furthermore, the paper also contains a brief demise of the most important representatives of comrnercial IDSs. | |
dc.identifier.isbn | 978-3-88579-665-7 | |
dc.identifier.pissn | 1617-5468 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | 10. DFN-Forum Kommunikationstechnologien | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-271 | |
dc.subject | Network Security | |
dc.subject | Intrusion Detection | |
dc.subject | Risk Rating | |
dc.subject | Risk Assessment | |
dc.subject | Risk Severity | |
dc.title | On the Perception of Risk Assessment in Intrusion Detection Systems | |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 30 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 21 | |
gi.conference.date | 30.-31. Mai 2017 | |
gi.conference.location | Berlin | |
gi.conference.sessiontitle | Sicherheit |
Dateien
Originalbündel
1 - 1 von 1