Cry Wolf: Toward an Experimentation Platform and Dataset for Human Factors in Cyber Security Analysis

02/24/2020
by   William Roden, et al.
0

Computer network defense is a partnership between automated systems and human cyber security analysts. The system behaviors, for example raising a high proportion of false alarms, likely impact cyber analyst performance. Experimentation in the analyst-system domain is challenging due to lack of access to security experts, the usability of attack datasets, and the training required to use security analysis tools. This paper describes Cry Wolf, an open source web application for user studies of cyber security analysis tasks. This paper also provides an open-access dataset of 73 true and false Intrusion Detection System (IDS) alarms derived from real-world examples of "impossible travel" scenarios. Cry Wolf and the impossible travel dataset were used in an experiment on the impact of IDS false alarm rate on analysts' abilities to correctly classify IDS alerts as true or false alarms. Results from that experiment are used to evaluate the quality of the dataset using difficulty and discrimination index measures drawn from classical test theory. Many alerts in the dataset provide good discrimination for participants' overall task performance.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/13/2023

A Controlled Experiment on the Impact of Intrusion Detection False Alarm Rate on Analyst Performance

Organizations use intrusion detection systems (IDSes) to identify harmfu...
research
09/18/2019

Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study

Intrusion Detection Systems (IDSs) are a necessary cyber defense mechani...
research
06/13/2023

The aesthetics of cyber security: How do users perceive them?

While specific aesthetic philosophies may differ across cultures, all hu...
research
05/23/2023

REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response

Automated Intelligent Cyberdefense Agents (AICAs) that are part Intrusio...
research
12/29/2019

Cyber Situation Awareness with Active Learning for Intrusion Detection

Intrusion detection has focused primarily on detecting cyberattacks at t...
research
01/31/2019

A Holistic Approach to Evaluating Cyber Security Defensive Capabilities

Metrics and frameworks to quantifiably assess security measures have ari...
research
12/16/2020

Investigating the Ecosystem of Offensive Information Security Tools

The internet landscape is growing and at the same time becoming more het...

Please sign up or login with your details

Forgot password? Click here to reset