2018
DOI: 10.1007/978-981-10-8204-7_39
|View full text |Cite
|
Sign up to set email alerts
|

The Implementation of Rule-Based Early Warning System in Snort Through Email

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…Whenever a new malicious packet is detected, the system has to upgrade the signature to perform better. If the rules are not optimized, the system will fail to generate benchmark signatures, and ultimately the system will be unable to detect the malicious activity [15]. In the Statistical-Based Intrusion Detection System (SBIDS), following the natural phenomena that is easy to flag things as "negative"; the rest are positive.…”
Section: Related Workmentioning
confidence: 99%
“…Whenever a new malicious packet is detected, the system has to upgrade the signature to perform better. If the rules are not optimized, the system will fail to generate benchmark signatures, and ultimately the system will be unable to detect the malicious activity [15]. In the Statistical-Based Intrusion Detection System (SBIDS), following the natural phenomena that is easy to flag things as "negative"; the rest are positive.…”
Section: Related Workmentioning
confidence: 99%
“…[6] c. Email Alerting The author uses email to send notifications when an attack occurs, starting from snort capturing anomalies that occur on the network which are forwarded to the snort database via barnyard2, when the event in the database increases, the python script automatically runs and sends a message to the email that has been prepared. [7]…”
Section: System Designmentioning
confidence: 99%