Intrusion detection systems. Refer to the Journal of Research of the National Institute of Standards and Technology
Question:
Intrusion detection systems. Refer to the Journal of Research of the National Institute of Standards and Technology (Nov.–Dec. 2003) study of a computer intrusion detection system (IDS), presented in Exercise 3.98
(p. 186). Recall that an IDS is designed to provide an alarm whenever unauthorized access (e.g., an intrusion)
to a computer system occurs. The probability of the system giving a false alarm (i.e., providing a warning when, in fact, no intrusion occurs) is defined by the symbol a, while the probability of a missed detection (i.e., no warning given when, in fact, an intrusion occurs) is defined by the symbol
b. These symbols are used to represent Type I and Type II error rates, respectively, in a hypothesis-testing scenario.
a. What is the null hypothesis H0?
b. What is the alternative hypothesis Ha?
c. According to actual data on the EMERALD system collected by the Massachusetts Institute of Technology Lincoln Laboratory, only 1 in 1,000 computer sessions with no intrusions resulted in a false alarm. For the same system, the laboratory found that only 500 of 1,000 intrusions were actually detected. Use this information to estimate the values of a and b.
Step by Step Answer:
Statistics Plus New Mylab Statistics With Pearson Etext Access Card Package
ISBN: 978-0134090436
13th Edition
Authors: James Mcclave ,Terry Sincich