We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice

Abstract: Our paper provides empirical comparisons between recent IDSs to provide an objective comparison between them to help users choose the most appropriate solution based on their requirements. Our results show that no one solution is the best, but is dependent on external variables such as the types of attacks, complexity, and network environment in the dataset. For example, BoT_IoT and Stratosphere IoT datasets both capture IoT-related attacks, but the deep neural network performed the best when tested using the BoT_IoT dataset while HELAD performed the best when tested using the Stratosphere IoT dataset. So although we found that a deep neural network solution had the highest average F1 scores on tested datasets, it is not always the best-performing one. We further discuss difficulties in using IDS from literature and project repositories, which complicated drawing definitive conclusions regarding IDS selection.
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
MSC classes: 68M25, 68M20
ACM classes: C.4; D.m
Cite as: arXiv:2403.17458 [cs.CR]
  (or arXiv:2403.17458v3 [cs.CR] for this version)

Submission history

From: Larry Huynh [view email]
[v1] Tue, 26 Mar 2024 07:46:27 GMT (258kb)
[v2] Wed, 27 Mar 2024 04:54:59 GMT (258kb)
[v3] Thu, 28 Mar 2024 09:02:35 GMT (258kb)

Link back to: arXiv, form interface, contact.