7.18 INTRUSION DETECTION SYSTEMS. The Journal of Research of the National Institute of Standards and Technology (November-December 2003) published a study of a computer intrusion detection system (IDS). The IDS is designed to provide an alarm whenever unauthorized access (e.g., an intrusion) to a computer system occurs. The probability of the system giving a false alarm (i.e., providing a warning when no intrusion occurs) is defined by the symbol a, while the probability of a missed detection (i.e., no warning given when an intrusion occurs) is defined by the symbol 3. These symbols are used to represent Type I and Type II error rates, respectively, in a hypothesis-testing scenario. a. What is the null hypothesis, Ho? b. What is the alternative hypothesis, Ha?

Calculus For The Life Sciences
2nd Edition
ISBN:9780321964038
Author:GREENWELL, Raymond N., RITCHEY, Nathan P., Lial, Margaret L.
Publisher:GREENWELL, Raymond N., RITCHEY, Nathan P., Lial, Margaret L.
Chapter10: Matrices
Section10.EA: Extended Application Contagion
Problem 2EA
icon
Related questions
Question
c. According to actual data collected by the
Massachusetts Institute of Technology
Lincoln Laboratory, only 1 in 1,000
computer sessions with no intrusions
resulted in a false alarm. For the same
system, the laboratory found that only 500 of
1,000 intrusions were actually detected. Use
this information to estimate the values of a
and B.
Transcribed Image Text:c. According to actual data collected by the Massachusetts Institute of Technology Lincoln Laboratory, only 1 in 1,000 computer sessions with no intrusions resulted in a false alarm. For the same system, the laboratory found that only 500 of 1,000 intrusions were actually detected. Use this information to estimate the values of a and B.
7.18 INTRUSION DETECTION SYSTEMS. The
Journal of Research of the National Institute of Standards
and Technology (November-December 2003)
published a study of a computer intrusion detection
system (IDS). The IDS is designed to provide an
alarm whenever unauthorized access (e.g., an
intrusion) to a computer system occurs. The
probability of the system giving a false alarm (i.e.,
providing a warning when no intrusion occurs) is
defined by the symbol a, while the probability of a
missed detection (i.e., no warning given when an
intrusion occurs) is defined by the symbol 3. These
symbols are used to represent Type I and Type II
error rates, respectively, in a hypothesis-testing
scenario.
a. What is the null hypothesis, Ho?
b. What is the alternative hypothesis, Ha?
Transcribed Image Text:7.18 INTRUSION DETECTION SYSTEMS. The Journal of Research of the National Institute of Standards and Technology (November-December 2003) published a study of a computer intrusion detection system (IDS). The IDS is designed to provide an alarm whenever unauthorized access (e.g., an intrusion) to a computer system occurs. The probability of the system giving a false alarm (i.e., providing a warning when no intrusion occurs) is defined by the symbol a, while the probability of a missed detection (i.e., no warning given when an intrusion occurs) is defined by the symbol 3. These symbols are used to represent Type I and Type II error rates, respectively, in a hypothesis-testing scenario. a. What is the null hypothesis, Ho? b. What is the alternative hypothesis, Ha?
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps with 3 images

Blurred answer
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Calculus For The Life Sciences
Calculus For The Life Sciences
Calculus
ISBN:
9780321964038
Author:
GREENWELL, Raymond N., RITCHEY, Nathan P., Lial, Margaret L.
Publisher:
Pearson Addison Wesley,
Glencoe Algebra 1, Student Edition, 9780079039897…
Glencoe Algebra 1, Student Edition, 9780079039897…
Algebra
ISBN:
9780079039897
Author:
Carter
Publisher:
McGraw Hill