Computer and Network Security

Table of Contents

Lecture 14: Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS)

Confusion matrix:

Confusion matrix

Metrics:

ROC curves

The false positive rate dominates the effectiveness of an IDS (look at Bayes’ Theorem calculation of P(intrusion|alert)).

IDS output should have truth file: meta-information about even stream describing attacks and relationships between each attack and events in stream

Host vs Network IDS

Host IDS:

Network IDS:

Evaluating IDS: