Pages • 2
Evaluation of IdsSecurity requirements vary for different work environments.Performance of an IDS can be optimized according to the requirements of the owner, the system and the environmentThis evaluation is based on mainly two parameters1. Detection rate 2. False alarm rateMethodologyTwo virtual machines :1. CentOS 6.5 (victim) – SecurityOnion on CentOS 6.5 as the software providing.