[PDF][PDF] Heuristic-based intrusion detection functionality in a snort environment

B Gdowski, R Kościej, M Niemiec - Information & Security, 2021 - connections-qj.org
This article provides an introduction to intrusion detection systems, focusing on extending
the Snort environment's functionalities by adding a new heuristic detection algorithm. The …

[PDF][PDF] Anomaly-based network intrusion detection system

LJG Villalba, ALS Orozco, JM Vidal - IEEE Latin America …, 2015 - researchgate.net
This paper presents a system for detecting intrusions when analyzing the network traffic
payload looking for malware evidences. The system implements the detection algorithm as a …

Design of a snort-based hybrid intrusion detection system

J Gómez, C Gil, N Padilla, R Baños… - … , Soft Computing, and …, 2009 - Springer
Computer security has become a major problem in our society. In particular, computer
network security is concerned with preventing the intrusion of an unauthorized person into a …

Network packet analysis in real time traffic and study of snort IDS during the variants of DoS attacks

N Kunhare, R Tiwari, J Dhar - … on Hybrid Intelligent Systems (HIS 2019) …, 2021 - Springer
This paper discusses the functionality of port scanning techniques used for accessing the IP
addresses of vulnerable hosts present in the network. These techniques usually perform for …

The architecture of a network level intrusion detection system

R Heady, G Luger, A Maccabe, M Servilla - 1990 - osti.gov
This paper presents the preliminary architecture of a network level intrusion detection
system. The proposed system will monitor base level information in network packets (source …

Study of snort-based IDS

S Chakrabarti, M Chakraborty… - Proceedings of the …, 2010 - dl.acm.org
General trend in industry is a shift from Intrusion Detection Systems (IDS) to Intrusion
Prevention Systems (IPS). In this paper, we have investigated the motivations behind this …

Anomaly detection 3.0 for Snort

M Szmit, S Adamus, S Bugała, A Szmit - Securitatea informaţională, 2012 - ibn.idsi.md
– 37 Maciej Szmit, Sławomir Adamus, Sebastian Bugała, Anna Szmit, Computer
Engineering Department, Technical University of Page 1 SECURITATEA …

A comparative performance analysis of the intrusion detection systems

M Saber, Z Bougroun, I El Farissi, S Chadli… - Advances in Smart …, 2020 - Springer
In a comparative analysis, this paper investigates the performance of two open source
intrusion detection systems (IDSs) namely SNORT and SURICATA for accurately detecting …

Network-based Intrusion detection systems Evaluation through a Short Term Experimental Script

LP Gaspary, LL Fagundes - International Conference on E-business …, 2004 - scitepress.org
Intrusion Detection Systems (IDSs) have become an essential component to improve
security in networked environments. The increasing set of available IDSs has stimulated …

[PDF][PDF] Analysis of various intrusion detection systems with a model for improving snort performance

RT Gaddam, M Nandhini - Indian J. Sci. Technol, 2017 - sciresol.s3.us-east-2.amazonaws …
Abstract Objectives: To assess various Intrusion Detection Systems (IDS) against various
types of attacks in different environments like Web, Enterprise, Cloud, etc. and to propose …