4.7 Article

Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices

Journal

ACM COMPUTING SURVEYS
Volume 48, Issue 1, Pages -

Publisher

ASSOC COMPUTING MACHINERY
DOI: 10.1145/2808691

Keywords

Computer intrusion detection systems; workload generation; metrics; measurement methodology

Funding

  1. Research Group of the Standard Performance Evaluation Corporation (SPEC)

Ask authors/readers for more resources

The evaluation of computer intrusion detection systems (which we refer to as intrusion detection systems) is an active research area. In this article, we survey and systematize common practices in the area of evaluation of such systems. For this purpose, we define a design space structured into three parts: workload, metrics, and measurement methodology. We then provide an overview of the common practices in evaluation of intrusion detection systems by surveying evaluation approaches and methods related to each part of the design space. Finally, we discuss open issues and challenges focusing on evaluation methodologies for novel intrusion detection systems.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available