Information Systems Research Vol. 16, No. 1, March 2005, pp. 28–46 issn 1047-7047 eissn 1526-5536 05 1601 0028 inf orms ® doi 10.1287/isre.1050.0041 ©2005 INFORMS The Value of Intrusion Detection Systems in Information Technology Security Architecture Huseyin Cavusoglu A. B. Freeman School of Business, Tulane University, 7 McAlister Drive, Goldring/Woldenberg Hall, New Orleans, Louisiana 70118, huseyin@tulane.edu Birendra Mishra School of Management, University of Texas at Dallas, Richardson, Texas 75083, and Anderson Graduate School of Management, University of California, Riverside, Riverside, California 92521, barry.mishra@ucr.edu Srinivasan Raghunathan School of Management, University of Texas at Dallas, Richardson, Texas 75083, sraghu@utdallas.edu T he increasing significance of information technology (IT) security to firms is evident from their growing IT security budgets. Firms rely on security technologies such as firewalls and intrusion detection systems (IDSs) to manage IT security risks. Although the literature on the technical aspects of IT security is proliferating, a debate exists in the IT security community about the value of these technologies. In this paper, we seek to assess the value of IDSs in a firm’s IT security architecture. We find that the IDS configuration, represented by detection (true positive) and false alarm (false positive) rates, determines whether a firm realizes a positive or negative value from the IDS. Specifically, we show that a firm realizes a positive value from an IDS only when the detection rate is higher than a critical value, which is determined by the hacker’s benefit and cost parameters. When the firm realizes a positive (negative) value, the IDS deters (sustains) hackers. However, irrespective of whether the firm realizes a positive or negative value from the IDS, the IDS enables the firm to better target its investigation of users, while keeping the detection rate the same. Our results suggest that the positive value of an IDS results not from improved detection per se, but from an increased deterrence enabled by improved detection. Finally, we show that the firm realizes a strictly nonnegative value if the firm configures the IDS optimally based on the hacking environment. Key words : economics of IT security; intrusion detection systems (IDSs); ROC curves; security configuration; IT security management History : Tridas Mukhopadhyay, Senior Editor; M. S. Krishnan, Associate Editor. This paper was received on December 5, 2001, and was with the authors 5 months for 2 revisions. 1. Introduction Dramatic increases in the number of IT security bre- aches and resulting monetary losses in recent years have made IT security a top issue in the manage- ment of IT infrastructure, 1 which is also reflected in 1 The number of computer intrusion cases filed with the Depart- ment of Justice jumped from 547 in 1998 to 1,154 in 1999 (Goodman and Brenner 2002). The losses from computer crime incidents reported by the Computer Security Institute (CSI)/Federal Bureau of Investigation (FBI) surveys were $456 million in 2002, in contrast to $378 million in 2000 and $266 million in 1999 (Power 2002). A global survey conducted by InformationWeek and Pricewaterhouse Coopers LLP estimated that computer viruses and hacking took a $1.6 trillion toll on the worldwide economy and a $266 billion toll in the United States alone (Denning 2000). the increasing security budgets of firms (Hulme 2002). Businesses and governments have undertaken sev- eral measures to minimize the loss from security breaches. IT security–related laws, popularly known as cyber laws, enacted by governments, act as broad deterrents against IT-related crimes. These external control mechanisms supplement a firm’s internal con- trol mechanisms. Traditionally, internal controls fall into two major categories: preventive and detective. In the IT security context, preventive controls, such as firewalls, aim to develop a defensive shield around IT systems to secure them from intrusions. Detec- tive controls, such as IDSs, try to detect intrusions that have already occurred. Because complete pre- 28