2015
DOI: 10.17512/jamcm.2015.1.05
|View full text |Cite
|
Sign up to set email alerts
|

Testing of IDS model using several intrusion detection tools

Abstract: Abstract. The aim of this work is to provide set of selected tests on IDS model that would enlarge the functionality of intrusion detection systems. Designed model is using several IDS, which allows it to investigate larger bandwidth and capture more attacks. This system consists of central master node and devices on which the intrusion detection systems are.The tests were designed with the attribute of repeatability and universality. They are divided into five categories which explore specific attributes of i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 6 publications
0
14
0
Order By: Relevance
“…DATA ANALYSIS AND VISUALIZATION Monitoring and analyzing the network traffic based on the IPFIX protocol [3], as depicted in Fig. 1, can be split into the following steps:…”
Section: Description Of the Problem Arising Duringmentioning
confidence: 99%
See 3 more Smart Citations
“…DATA ANALYSIS AND VISUALIZATION Monitoring and analyzing the network traffic based on the IPFIX protocol [3], as depicted in Fig. 1, can be split into the following steps:…”
Section: Description Of the Problem Arising Duringmentioning
confidence: 99%
“…Nowadays, the most commonly used data measurement methods are based on collecting information about the network and its traffic at the level of flows. Network monitoring by flow-level based measurement platformseither implementing the NetFlow v9 [2] or IPFIX [3] protocolsis based on the analysis of information obtained from traffic properties and characteristics. These properties (e.g.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The Snort is a type of IDS [3], where intrusion detection is based on known algorithms and attack pattern, i.e. signatures.…”
Section: Introductionmentioning
confidence: 99%