Essays about: "Snort"
Showing result 11 - 15 of 18 essays containing the word Snort.
-
11. Improving the precision of an Intrusion Detection System using Indicators of Compromise : - a proof of concept -
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The goal of this research is to improve an IDS so that the percentage of true positives is high, an organisation can cut time and cost and use its resources in a more optimal way. This research goal was to prove that the precision of an intrusion detection system (IDS), in terms of producing lower rate of false positives or higher rate of true alerts, can be achieved by parsing indicators of compromise (IOC) to gather information, that combined with system-specific knowledge will be a solid base for manual fine-tuning of IDS-rules. READ MORE
-
12. Network Intrusion and Detection : An evaluation of SNORT
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Network security has become a vital part for computer networks to ensure that they operate as expected. With many of today's services relying on networks it is of great importance that the usage of networks are not being compromised. One way to increase the security of a computer network is to implement a Network Intrusion Detection System (NIDS). READ MORE
-
13. Evaluation of Intrusion Detection Systems under Denial of Service Attack in virtual Environment
University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikAbstract : Context. The intrusion detection systems are being widely used for detecting the malicious traffic in many industries and they use a variety of technologies. Each IDs had different architecture and are deployed for detecting malicious activity. Intrusion detection system has a different set of rules which can defined based on requirement. READ MORE
-
14. Assessment of Snort Intrusion Prevention System in Virtual Environment Against DoS and DDoS Attacks : An empirical evaluation between source mode and destination mode
University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikAbstract : Context. Cloud computing (CC) is developed as a Human-centered computing model to facilitate its users to access resources anywhere on the globe. The resources can be shared among any cloud user which mainly questions the security in cloud computing. READ MORE
-
15. IDS on Raspberry Pi : A Performance Evaluation
University essay from Linnéuniversitetet/Institutionen för datavetenskap (DV)Abstract : This is a report on the possibility of using a Raspberry Pi as an intrusion detection system in a home environment to increase network security. The focus of this study was on how well two different generations of Raspberry Pi would be able to handle network traffic while acting as an intrusion detection system. READ MORE