A fundamental problem in intrusion detection is what met-ric(s) can be used to objectively evaluate an intrusion detec-tion system (IDS) in terms of its ability to correctly classify events as normal or intrusive. Traditional metrics (e.g., true positive rate and false positive rate) measure different as-pects, but no single metric seems sufficient to measure the capability of intrusion detection systems. The lack of a sin-gle unified metric makes it difficult to fine-tune and evaluate an IDS. In this paper, we provide an in-depth analysis of ex-isting metrics. Specifically, we analyze a typical cost-based scheme [6], and demonstrate that this approach is very con-fusing and ineffective when the cost factor is not carefully se-lected. In ad...
Proceeding of: 6th Industrial Conference on Data Mining, ICDM 2006, Leipzig, Germany, July 14-15, 20...
Alongside with digital signatures and Cryptographic protocols, Intrusion Detection Systems (IDS) are...
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing ...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this pa...
Part 5: Metrics and Risk AssessmentInternational audienceNowadays intrusion detection system (IDS) h...
Network intrusions compromise the network’s confidentiality, integrity and availability of resources...
In this paper, we consider a cost-based extension of intrusion detection capability (CID). An object...
The behavior and nature of attacks and threats to computer network systems have been evolving rapidl...
Recent studies about Intrusion Detection Systems (IDS) performance reveal that the value of an IDS a...
The problem of previous approaches in anomaly detection in Intrusion Detection System (IDS) is to pr...
The enhancements of Intrusion Detection Systems (IDS) are still bellow expectations. The great numbe...
Proceeding of: 6th Industrial Conference on Data Mining, ICDM 2006, Leipzig, Germany, July 14-15, 20...
Alongside with digital signatures and Cryptographic protocols, Intrusion Detection Systems (IDS) are...
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing ...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this pa...
Part 5: Metrics and Risk AssessmentInternational audienceNowadays intrusion detection system (IDS) h...
Network intrusions compromise the network’s confidentiality, integrity and availability of resources...
In this paper, we consider a cost-based extension of intrusion detection capability (CID). An object...
The behavior and nature of attacks and threats to computer network systems have been evolving rapidl...
Recent studies about Intrusion Detection Systems (IDS) performance reveal that the value of an IDS a...
The problem of previous approaches in anomaly detection in Intrusion Detection System (IDS) is to pr...
The enhancements of Intrusion Detection Systems (IDS) are still bellow expectations. The great numbe...
Proceeding of: 6th Industrial Conference on Data Mining, ICDM 2006, Leipzig, Germany, July 14-15, 20...
Alongside with digital signatures and Cryptographic protocols, Intrusion Detection Systems (IDS) are...
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing ...