Automatic Evaluation of Intrusion Detection Systems