Cargando…

Evaluation of Intrusion Detection Systems

This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on thi...

Descripción completa

Detalles Bibliográficos
Autores principales: Ulvila, Jacob W., Gaffney, John E.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: [Gaithersburg, MD]: U.S. Dept. of Commerce, National Institute of Standards and Technology 2003
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4844520/
https://www.ncbi.nlm.nih.gov/pubmed/27413623
http://dx.doi.org/10.6028/jres.108.040
Descripción
Sumario:This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric. Results are given for the operation of a single IDS and for a combination of two IDSs. The method is illustrated for: 1) determining the best operating point for a single and double IDS based on the costs of mistakes and the hostility of the operating environment as represented in the prior probability of intrusion and 2) evaluating single and double IDSs on the basis of expected cost. A method is also described for representing a compound IDS as an equivalent single IDS. Results are presented from the point of view of a system administrator, but they apply equally to designers of IDSs.