Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

System Security Problem: ROC Curve of an IDS You are told to design an intrusion detection algorithm that identifies vulnerabilities by solely looking at transaction

System Security

Problem: ROC Curve of an IDS

You are told to design an intrusion detection algorithm that identifies vulnerabilities by solely looking at transaction length, i.e., the algorithm uses a packet length threshold T that determines when a packet is marked as an attack. More formally, the algorithm is defined:

D(k, T) -> 0/1

where k is the packet length of a suspect packet in bytes, T is the length threshold, and if the packet length is not greater than T, that packet should be marked as an attack (i.e., 1); otherwise marked as not (i.e., 0). You are given the following data to use to design the algorithm.

  • attack packet lengths: 1, 1, 2, 3, 5, 8
  • non-attack packet lengths: 2, 2, 4, 6, 6, 7, 8, 9

Draw the ROC curve.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Development Of Knowledge Framework For Affective Content Analysis

Authors: Swarnangini Sinha

1st Edition

B0CQJ13WZ1, 979-8223977490

More Books

Students also viewed these Databases questions