Essays about: "snort evaluation"

Showing result 1 - 5 of 7 essays containing the words snort evaluation.

  1. 1. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Keywords : Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Abstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE

  2. 2. Lightweight Portable Intrusion Detection System for Auditing Applications : Implementation and evaluation of a lightweight portable intrusion detection system using Raspberry Pi and Wi-Fi Pineapple

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Carl Nykvist; Martin Larsson; [2019]
    Keywords : IDS; LPIDS; KMP; Raspberry Pi; Aho-Corasick; Wi-Fi Pineapple;

    Abstract : The goal of this thesis was to develop, deploy and evaluate a lightweight portable intrusion detection system (LPIDS) over wireless networks. The LPIDS was developed by adopting two different string matching algorithms: Aho-Corasick algorithm and Knuth–Morris–Pratt algorithm (KMP). READ MORE

  3. 3. Network Intrusion and Detection : An evaluation of SNORT

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Theodor Fleming; Hjalmar Wilander; [2018]
    Keywords : network intrusion detection system; intrusion detection system; snort; snort evaluation;

    Abstract : Network security has become a vital part for computer networks to ensure that they operate as expected. With many of today's services relying on networks it is of great importance that the usage of networks are not being compromised. One way to increase the security of a computer network is to implement a Network Intrusion Detection System (NIDS). READ MORE

  4. 4. Evaluation of Intrusion Detection Systems under Denial of Service Attack in virtual  Environment

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : venkatesh nagadevara; [2017]
    Keywords : snort; suricata; ossec; intrusion detection system;

    Abstract : Context. The intrusion detection systems are being widely used for detecting the malicious traffic in many industries and they use a variety of technologies. Each IDs had different architecture and are deployed for detecting malicious activity. Intrusion detection system has a different set of rules which can defined based on requirement. READ MORE

  5. 5. Assessment of Snort Intrusion Prevention System in Virtual Environment Against DoS and DDoS Attacks : An empirical evaluation between source mode and destination mode

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Avinash Kiran Ivvala; [2017]
    Keywords : Intrusion Prevention Systems; cloud computing; snort; source mode; destination mode.;

    Abstract : Context. Cloud computing (CC) is developed as a Human-centered computing model to facilitate its users to access resources anywhere on the globe. The resources can be shared among any cloud user which mainly questions the security in cloud computing. READ MORE