Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice

Hesford, Jake, Cheng, Daniel, Wan, Alan, Huynh, Larry, Kim, Seungho, Kim, Hyoungshick, Hong, Jin B.

arXiv.org Artificial Intelligence 

However, it is or flows. Where a dataset does not contain both of these also a challenge when trying to compare them and choose the formats, adapting it into the form expected by a given IDS is best one for your needs, because there is no standardisation non-trivial, where the expected format is not the one provided due to the complexity of the environment that these IDSs by the dataset authors. This discrepancy presents challenges were designed for. In order to determine to what degree in obtaining satisfactory results when an IDS and dataset are IDSs can be adapted to different environments, we compare incompatible without significant processing [1]. Our evaluation their performance across common Network Intrusion process was further complicated by the necessity of converting Detection Systems (NIDS) datasets. This approach aims to these datasets into formats compatible with various IDS provide a more standardized basis for comparison, taking into solutions. This data wrangling could amplify the errors and account different variables such as attack types, networking inconsistencies inherent in the datasets.

Duplicate Docs Excel Report

Title
None found

Similar Docs  Excel Report  more

TitleSimilaritySource
None found