2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT) 2015
DOI: 10.1109/icatcct.2015.7456901
|View full text |Cite
|
Sign up to set email alerts
|

Comparative study and analysis of network intrusion detection tools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(9 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…Snort detects network intrusion such as Dos, DDos, port scans, nmap scans, SBM probes, CGI attacks, and NetBIOS queries. [127]. Snort consists of different components including packet capture module, packet decoder, preprocessors, detection engine, logging and alerting system, and output module.…”
Section: A Snortmentioning
confidence: 99%
See 1 more Smart Citation
“…Snort detects network intrusion such as Dos, DDos, port scans, nmap scans, SBM probes, CGI attacks, and NetBIOS queries. [127]. Snort consists of different components including packet capture module, packet decoder, preprocessors, detection engine, logging and alerting system, and output module.…”
Section: A Snortmentioning
confidence: 99%
“…It is an open source IDS tool which provides a powerful analysis engine, rootkit detection, Windows registry checking, and real time alert and response [127]. In addition, the OSSEC also provides checklists which frequently validate the significant files from time to time.…”
Section: Ossecmentioning
confidence: 99%
“…Other software tools can be used for this purpose [15]. In [16], it is claimed that the signature-based Snort is not suitable for advanced customization and high-speed networks because of its simplicity and low-end nature. Suricata is recommended as a multi-thread architecture that can cope well with anomalous situations and large-extent customization.…”
Section: Performance Analysismentioning
confidence: 99%
“…To improve the detection accuracy, the commercial network intrusion detection system [18,19] abstracted the characteristics of network attack using multiple algorithm and created a misuse detection model of network attacks. The network intrusion detection system based on misuse detection has high detection efficiency and low probability of false alarm.…”
Section: Related Workmentioning
confidence: 99%