2020 2nd International Conference on Broadband Communications, Wireless Sensors and Powering (BCWSP) 2020
DOI: 10.1109/bcwsp50066.2020.9249449
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of IDS Snort and IDS Suricata with Many-Core Processor in Virtual Machines Against Dos/DDoS Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Snort is a de‐facto industry standard traditional network‐based IDS solution for detecting malicious activity. Snort monitors the network and detects the threats based on the concept of ‘Signatures’ 49,50 . These signatures are a set of rules of the network packet that signals ongoing threats.…”
Section: Experiments and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Snort is a de‐facto industry standard traditional network‐based IDS solution for detecting malicious activity. Snort monitors the network and detects the threats based on the concept of ‘Signatures’ 49,50 . These signatures are a set of rules of the network packet that signals ongoing threats.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…Snort monitors the network and detects the threats based on the concept of 'Signatures'. 49,50 These signatures are a set of rules of the network packet that signals ongoing threats. However, signatures cannot detect emerging threats or small variations in attack patterns.…”
Section: Performance Evaluationmentioning
confidence: 99%