Developing expertise for network intrusion detection

Purpose - The paper seeks to provide a foundational understanding of the socio-technical system that is computer network intrusion detection, including the nature of the knowledge work, situated expertise, and processes of learning as supported by information technology.Design methodology approach -...

Full description

Saved in:
Bibliographic Details
Published inInformation technology & people (West Linn, Or.) Vol. 22; no. 2; pp. 92 - 108
Main Authors Goodall, John R., Lutters, Wayne G., Komlodi, Anita
Format Journal Article
LanguageEnglish
Published West Linn Emerald Group Publishing Limited 05.06.2009
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Purpose - The paper seeks to provide a foundational understanding of the socio-technical system that is computer network intrusion detection, including the nature of the knowledge work, situated expertise, and processes of learning as supported by information technology.Design methodology approach - The authors conducted a field study to explore the work of computer network intrusion detection using multiple data collection methods, including semi-structured interviews, examination of security tools and resources, analysis of information security mailing list posts, and attendance at several domain-specific user group meetings.Findings - The work practice of intrusion detection analysts involves both domain expertise of networking and security and a high degree of situated expertise and problem-solving activities that are not predefined and evolve with the dynamically changing context of the analyst's environment. This paper highlights the learning process needed to acquire these two types of knowledge, contrasting this work practice with that of computer systems administrators.Research limitations implications - The research establishes a baseline for future research into the domain and practice of intrusion detection, and, more broadly, information security.Practical implications - The results presented here provide a critical examination of current security practices that will be useful to developers of intrusion detection support tools, information security training programs, information security management, and for practitioners themselves.Originality value - There has been no research examining the work or expertise development processes specific to the increasingly important information security practice of intrusion detection. The paper provides a foundation for future research into understanding this highly complex, dynamic work.
Bibliography:ark:/67375/4W2-365BZP31-H
href:09593840910962186.pdf
original-pdf:1610220201.pdf
istex:848E8DCB8D7C689E2BC05A1BA56E5E89F6E63B89
filenameID:1610220201
ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ObjectType-Article-1
ObjectType-Feature-2
ISSN:0959-3845
1758-5813
DOI:10.1108/09593840910962186