A Controlled Experiment on the Impact of Intrusion Detection False Alarm Rate on Analyst Performance

07/13/2023
by   Lucas Layman, et al.
0

Organizations use intrusion detection systems (IDSes) to identify harmful activity among millions of computer network events. Cybersecurity analysts review IDS alarms to verify whether malicious activity occurred and to take remedial action. However, IDS systems exhibit high false alarm rates. This study examines the impact of IDS false alarm rate on human analyst sensitivity (probability of detection), precision (positive predictive value), and time on task when evaluating IDS alarms. A controlled experiment was conducted with participants divided into two treatment groups, 50 86 false alarms. Results show statistically significant differences in precision and time on task. The median values for the 86 lower precision and 40 group. No significant difference in analyst sensitivity was observed.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/13/2008

Intrusion Detection Using Cost-Sensitive Classification

Intrusion Detection is an invaluable part of computer networks defense. ...
research
02/24/2020

Cry Wolf: Toward an Experimentation Platform and Dataset for Human Factors in Cyber Security Analysis

Computer network defense is a partnership between automated systems and ...
research
03/05/2010

Integrating Innate and Adaptive Immunity for Intrusion Detection

Network Intrusion Detection Systems (NDIS) monitor a network with the ai...
research
12/29/2019

Cyber Situation Awareness with Active Learning for Intrusion Detection

Intrusion detection has focused primarily on detecting cyberattacks at t...
research
03/14/2022

Base-Rate Fallacy Redux and a Deep Dive Review in Cybersecurity

This paper examines the current state of the science underlying cybersec...
research
12/08/2022

Lie detection algorithms attract few users but vastly increase accusation rates

People are not very good at detecting lies, which may explain why they r...
research
11/15/2021

Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments

Artifacts such as log data and network traffic are fundamental for cyber...

Please sign up or login with your details

Forgot password? Click here to reset