Article accepted for publication in the prestigious journal "ACM Computing Surveys"
Tuesday, July 28, 2015 04:00
A paper by the SPEC RG IDS Benchmarking Working Group has been accepted for publication in ACM Computing Surveys (CSUR). The paper surveys the state-of-the-art in the area of evaluation of intrusion detection systems.
[A paper produced by the SPEC RG IDS Benchmarking Working Group has been accepted for publication in ACM Computing Surveys (CSUR). The paper surveys the state-of-the-art in the area of evaluation of intrusion detection systems.]{style=“font-size: 13px; font-family: Helvetica, Arial, sans-serif; color: #333333; widows: 1; line-height: 17px; background-color: #ffffff;"}
[CSUR publishes survey articles and tutorials related to computer science and computing. According to the ISI Journal Citation Reports, CSUR has among the highest impact factors of all computer science journals.]{style=“font-size: 13px; font-family: Helvetica, Arial, sans-serif; color: #333333; widows: 1; line-height: 17px; background-color: #ffffff;"}
[Reference:
Aleksandar Milenkoski, Marco Vieira, Samuel Kounev, Alberto Avrtizer,
and Bryan D. Payne. Evaluating Computer Intrusion Detection Systems: A
Survey of Common Practices. ACM Computing Surveys, 2015,
ACM.]{style=“font-size: 13px; font-family: Helvetica, Arial, sans-serif; color: #333333; widows: 1; line-height: 17px; background-color: #ffffff;"}
[Abstract:
]{style=“font-size: 13px; font-family: Helvetica, Arial, sans-serif; color: #333333; widows: 1; line-height: 17px; background-color: #ffffff;"}[
The evaluation of computer intrusion detection systems (which we refer
to as intrusion detection systems) is an active research area. In this
paper, we survey and systematize common practices in the area of
evaluation of intrusion detection systems. For this purpose, we define a
design space structured into three parts: workload, metrics, and
measurement methodology. We then provide an overview of the common
practices in evaluation of intrusion detection systems by surveying
evaluation approaches and methods related to each part of the design
space. Finally, we discuss open issues and challenges focusing on
evaluation methodologies for novel intrusion detection
systems.]{style=“font-size: 13px; font-family: Helvetica, Arial, sans-serif; color: #333333; widows: 1; line-height: 17px; background-color: #ffffff;"}