Article accepted for publication in the prestigious journal "ACM Computing Surveys"

Tuesday, July 28, 2015 04:00

A paper by the SPEC RG IDS Benchmarking Working Group has been accepted for publication in ACM Computing Surveys (CSUR). The paper surveys the state-of-the-art in the area of evaluation of intrusion detection systems.

[A paper produced by the SPEC RG IDS Benchmarking Working Group has been accepted for publication in ACM Computing Surveys (CSUR). The paper surveys the state-of-the-art in the area of evaluation of intrusion detection systems.]{style=“font-size: 13px; font-family: Helvetica, Arial, sans-serif; color: #333333; widows: 1; line-height: 17px; background-color: #ffffff;"}

[CSUR publishes survey articles and tutorials related to computer science and computing. According to the ISI Journal Citation Reports, CSUR has among the highest impact factors of all computer science journals.]{style=“font-size: 13px; font-family: Helvetica, Arial, sans-serif; color: #333333; widows: 1; line-height: 17px; background-color: #ffffff;"}

[Reference:
Aleksandar Milenkoski, Marco Vieira, Samuel Kounev, Alberto Avrtizer, and Bryan D. Payne. Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices. ACM Computing Surveys, 2015, ACM.]{style=“font-size: 13px; font-family: Helvetica, Arial, sans-serif; color: #333333; widows: 1; line-height: 17px; background-color: #ffffff;"}

[Abstract: ]{style=“font-size: 13px; font-family: Helvetica, Arial, sans-serif; color: #333333; widows: 1; line-height: 17px; background-color: #ffffff;"}[
The evaluation of computer intrusion detection systems (which we refer to as intrusion detection systems) is an active research area. In this paper, we survey and systematize common practices in the area of evaluation of intrusion detection systems. For this purpose, we define a design space structured into three parts: workload, metrics, and measurement methodology. We then provide an overview of the common practices in evaluation of intrusion detection systems by surveying evaluation approaches and methods related to each part of the design space. Finally, we discuss open issues and challenges focusing on evaluation methodologies for novel intrusion detection systems.]{style=“font-size: 13px; font-family: Helvetica, Arial, sans-serif; color: #333333; widows: 1; line-height: 17px; background-color: #ffffff;"}