Performance analysis of two open source intrusion detection systems

被引:0
|
作者
Brumen, Bostjan [1 ]
Legvart, Jernej [1 ]
机构
[1] Univ Maribor, Fac Elect Engn & Comp Sci, Smetanova 17, SI-2000 Maribor, Slovenia
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Several studies have been conducted where authors compared the performance of open source Intrusion detection systems, namely Snort and Suricata. However, most studies were limited to either security indicators or performance measurements under the same operating system. The objective of this study is to give a comprehensive analysis of both products in terms of several security related and performance related indicators. In addition, we tested the products under two different operating systems. Several experiments were run to evaluate the effects of open source intrusion detection and prevention systems Snort and Suricata, operating systems Windows, Linux and various attack types on system resource usage, dropped packets rate and ability to detect intrusions. The results show that Suricata has a higher CPU and RAM utilization than Snort in all cases on both operating systems, but lower percentage of dropped packets when evaluated during five of six simulated attacks. Both products had the same number of correctly identified intrusions. The results show that Linux-based solutions consume more system resources, but Windows-based systems had a higher rate of dropped packets. This indicates that these two intrusion detection and prevention systems should be run on Linux. However, both systems are inappropriate for high volumes of traffic in single-server setting.
引用
收藏
页码:1387 / 1392
页数:6
相关论文
共 50 条
  • [1] Diversity in Open Source Intrusion Detection Systems
    Asad, Hafizul
    Gashi, Ilir
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY (SAFECOMP 2018), 2018, 11093 : 267 - 281
  • [2] FREE AND OPEN SOURCE INTRUSION DETECTION SYSTEMS: A STUDY
    Tirumala, Sreenivas Sremath
    Sathu, Hira
    Sarrafzadeh, Abdolhossein
    [J]. PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOL. 1, 2015, : 205 - 210
  • [3] Dynamical analysis of diversity in rule-based open source network intrusion detection systems
    Hafizul Asad
    Ilir Gashi
    [J]. Empirical Software Engineering, 2022, 27
  • [4] Dynamical analysis of diversity in rule-based open source network intrusion detection systems
    Asad, Hafizul
    Gashi, Ilir
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2022, 27 (01)
  • [5] Analysing performance issues of open-source intrusion detection systems in high-speed networks
    Hu, Qinwen
    Yu, Se-Young
    Asghar, Muhammad Rizwan
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [6] WIRELESS INTRUSION DETECTION WITH OPEN SOURCE TOOLS
    Timofte, Carmen Manuela
    Zota, Razvan Daniel
    Constantinescu, Radu
    [J]. CRISES AFTER THE CRISIS: INQUIRIES FROM A NATIONAL, EUROPEAN AND GLOBAL PERSPECTIVE, VOL III, 2011, : 415 - 419
  • [7] Performance Analysis of Intrusion Detection Systems in the Cloud Computing
    Abdelaziz, Ettaoufik
    Mohamed, Ouzzif
    [J]. PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 136 - 143
  • [8] Performance analysis of content matching intrusion detection systems
    Antonatos, S
    Anagnostakis, KG
    Markatos, EP
    Polychronakis, M
    [J]. 2004 INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 2004, : 208 - 215
  • [9] A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems
    H. Asad
    S. Adhikari
    Ilir Gashi
    [J]. International Journal of Information Security, 2024, 23 : 1331 - 1346
  • [10] Intrusion detection systems - Introduction to intrusion detection and analysis
    Debar, H
    [J]. SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 161 - 177