Part 5: Metrics and Risk AssessmentInternational audienceNowadays intrusion detection system (IDS) has a considerable attention as a crucial element in network security. The question that arises is which IDS is effective for our system? The answer should inevitably take into account the evaluation of IDSs effectiveness. Dealing with this challenge, many valuable evaluation metrics have been introduced such as receiver operating characteristic (ROC) curve, Bayesian detection rate, intrusion detection capability, intrusion detection operating characteristic, cost-based metrics, etc. The benefits and drawbacks of these metrics are discussed in this paper. We subsequently propose a novel metric called intrusion detection effectiveness (EID) tha...
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this pa...
There are a multitude of threats now faced in computer networks such as viruses, worms, tro...
Proceeding of: 6th Industrial Conference on Data Mining, ICDM 2006, Leipzig, Germany, July 14-15, 20...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
A fundamental problem in intrusion detection is what met-ric(s) can be used to objectively evaluate ...
Wireless Intrusion Detection System (IDS) performance metrics are used to measure the ability of a w...
Network intrusions compromise the network’s confidentiality, integrity and availability of resources...
Network Intrusion Detection Systems (NIDS) are hardware or software systems that are used to identif...
The behavior and nature of attacks and threats to computer network systems have been evolving rapidl...
An Intrusion Detection System (IDS) is a security device that monitors malicious activity against a ...
The enhancements of Intrusion Detection Systems (IDS) are still bellow expectations. The great numbe...
While intrusion detection systems are becoming ubiquitous defenses in today's networks, current...
Wireless intrusion detection system (WIDS) has become a matter of increasing concern in recent years...
Network Intrusion detection systems (NIDS) are security systems utilized to detect security threats ...
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this pa...
There are a multitude of threats now faced in computer networks such as viruses, worms, tro...
Proceeding of: 6th Industrial Conference on Data Mining, ICDM 2006, Leipzig, Germany, July 14-15, 20...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
A fundamental problem in intrusion detection is what met-ric(s) can be used to objectively evaluate ...
Wireless Intrusion Detection System (IDS) performance metrics are used to measure the ability of a w...
Network intrusions compromise the network’s confidentiality, integrity and availability of resources...
Network Intrusion Detection Systems (NIDS) are hardware or software systems that are used to identif...
The behavior and nature of attacks and threats to computer network systems have been evolving rapidl...
An Intrusion Detection System (IDS) is a security device that monitors malicious activity against a ...
The enhancements of Intrusion Detection Systems (IDS) are still bellow expectations. The great numbe...
While intrusion detection systems are becoming ubiquitous defenses in today's networks, current...
Wireless intrusion detection system (WIDS) has become a matter of increasing concern in recent years...
Network Intrusion detection systems (NIDS) are security systems utilized to detect security threats ...
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this pa...
There are a multitude of threats now faced in computer networks such as viruses, worms, tro...
Proceeding of: 6th Industrial Conference on Data Mining, ICDM 2006, Leipzig, Germany, July 14-15, 20...