2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS) 2016
DOI: 10.1109/icaccs.2016.7586351
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of Snort-based Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0
5

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(15 citation statements)
references
References 10 publications
0
10
0
5
Order By: Relevance
“…Discussion Snort types of attacks often occur as part of a system intrusion that can be in the form of scanning Nmap ports, LOIC, SQL Injection, and database access [18]. Some technical aspects must be elaborated such as: How the system handles a variety of effective security that is faced with a high rate of growth in the volume of data, and how aspects of information security will be addressed [19]. Rule Snort is a Snort rule that contains databases with attack patterns.…”
Section: Resultsmentioning
confidence: 99%
“…Discussion Snort types of attacks often occur as part of a system intrusion that can be in the form of scanning Nmap ports, LOIC, SQL Injection, and database access [18]. Some technical aspects must be elaborated such as: How the system handles a variety of effective security that is faced with a high rate of growth in the volume of data, and how aspects of information security will be addressed [19]. Rule Snort is a Snort rule that contains databases with attack patterns.…”
Section: Resultsmentioning
confidence: 99%
“…The rule-based detection basically identifies known type of attacks. The most commercially used IDS is Snort [8] which detects an attack based on content matching the rules from the file that contains characteristics of each type of an attack. The main drawback for this method is that it cannot identify new types of attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The rule can then filter the acquired data. The performance analysis is the topic of [9], where it is stated that Snort works correctly if updated regularly, otherwise it will not be able to detect the newest types of attacks and threats. The operation of Snort can be enhanced for example by using dynamic fuzzy rule interpolation, which enhances Snort to current network conditions dynamically [10].…”
Section: Selected Intrusion Prevention Systemsmentioning
confidence: 99%