Criterion | Evaluation Elements |
Data | Type of Data, Amount of Data, Origin of Data |
Detection Range | Accuracy, Completeness, Known Attacks, Masquerade Attacks, Denial of Service, Malicious Use, Leakage, Attempted Break-Ins, Penetration of Security Control Systems |
Resources | Overhead |
Network | Network based or not, Portability |
System Architecture | Methods of Detection, Real-time Operation, Human Supervision, Manipulation Level, Behavior Modeling, Attack Resistance |
Alarm | Countermeasure Activities, Detection Time |
System Change | User Behavior, Sensitivity Levels, Expanding System, Knowledge Base |