SOCIETY

Global Best Practices and Recommendations for Assessing and Improving Cybersecurity by Applying Intrusion Detection / Prevention System Selection Metrics

  • 1 G. S. Rakovski National Defence College Sofia, Bulgaria
  • 2 ITWorks, Sofia, Bulgaria
  • 3 Future Innovation Labs

Abstract

This article proposes an approach to improving the use of IDS/IPS systems in computer networks of forces and means of state and local administration bodies in the event of incidents, disasters, accidents and catastrophes. To this end, good practices for selecting an appropriate type of IDPS to increase the level of cybersecurity in the organization are studied. It is proposed to use the “type” metric to develop a comparative analysis of the correspondence between the types of IDPS and their ability to protect against ransomware, using the classification of tactics and techniques in accordance with the MITRE ATT&CK framework.

Keywords

References

  1. Veselina Aleksandrova, Ivo Tasev, Violeta Vasileva, Challenges In Choosing The Type of Intrusion Detection and Prevention System to Increase the Level of Cybersecurity in the Organization, 12th International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE – 2022), December 02-03rd, 2022, Publishing Complex – UNWE, Sofia, Bulgaria. Volume: 50, ISSN 2367-7635 (PRINT), ISSN 2367-7643 (ONLINE), Issued for publication: June 27th, 2024 pp. 27-33, https://icaictsee.unwe.bg/past-conferences/ICAICTSEE-2022.pdf
  2. Information technology — Security techniques — Selection, deployment and operations of intrusion detection systems (IDPS) - ISO/IEE 27039 2015.02.15
  3. Information technology – Security techniques – Information security management systems – Requirements ISO/IEE 270001:2015
  4. National Institute of Standards and Technology - Guide to Intrusion Detection and Prevention Systems (IDPS) – Special Publication 800-94
  5. ENISA – ENISA THREAT LANDSCAPE 2021
  6. ENISA – ENISA THREAT LANDSCAPE 2022
  7. ENISA – ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS 2022
  8. Cybersecurity & Infrastructure Security Agency CISA – ―Plan, Do, Check, Act‖ Nov 01 2013
  9. https://attack.mitre.org/
  10. Kumar, Gulshan. (2015). Evaluation Metrics for Intrusion Detection Systems-A Study. International Journal of Computer Science and Mobile Applications. 11.

Article full text

Download PDF