great number of false positives (false alarms) and false negatives (undetected intrusions)
has survived in recent versions as well as in the old ones. This may be-in part-caused by the
shortage of an effective, unbiased evaluation and testing methodology that is both
scientifically rigorous and technically feasible. The complexity of the environments where
Intrusion detection systems operate, makes the evaluation process itself a nontrivial task. For …