Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice
Hesford, Jake, Cheng, Daniel, Wan, Alan, Huynh, Larry, Kim, Seungho, Kim, Hyoungshick, Hong, Jin B.
–arXiv.org Artificial Intelligence
However, it is or flows. Where a dataset does not contain both of these also a challenge when trying to compare them and choose the formats, adapting it into the form expected by a given IDS is best one for your needs, because there is no standardisation non-trivial, where the expected format is not the one provided due to the complexity of the environment that these IDSs by the dataset authors. This discrepancy presents challenges were designed for. In order to determine to what degree in obtaining satisfactory results when an IDS and dataset are IDSs can be adapted to different environments, we compare incompatible without significant processing [1]. Our evaluation their performance across common Network Intrusion process was further complicated by the necessity of converting Detection Systems (NIDS) datasets. This approach aims to these datasets into formats compatible with various IDS provide a more standardized basis for comparison, taking into solutions. This data wrangling could amplify the errors and account different variables such as attack types, networking inconsistencies inherent in the datasets.
arXiv.org Artificial Intelligence
Mar-28-2024
- Country:
- North America > United States > California (0.28)
- Genre:
- Overview (0.68)
- Research Report > New Finding (0.46)
- Industry:
- Information Technology > Security & Privacy (1.00)
- Technology:
- Information Technology
- Artificial Intelligence > Machine Learning
- Neural Networks > Deep Learning (0.94)
- Communications > Networks (1.00)
- Data Science > Data Mining (1.00)
- Security & Privacy (1.00)
- Artificial Intelligence > Machine Learning
- Information Technology