Snort Rule Detection for Countering in Network Attacks

被引:2
|
作者
Somu, Venkateswarlu [1 ]
Kamesh, D. B. K. [2 ]
Sastry, J. K. R. [2 ]
Sitara, S. N. M. [3 ]
机构
[1] KL Univ, Dept CSE, Vaddeswaram, India
[2] KL Univ, Dept ECM, Vaddeswaram, India
[3] KL Univ, Dept ECE, Vaddeswaram, India
关键词
Mobile; RFID; NID; TCP;
D O I
10.1007/978-981-10-3153-3_57
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phones are turning into the surely understood method for relationship; strategies helping adaptability connote a genuine asset of issues in light of the fact that their preparatory style did not execute effective assurance. A novel structure work of turn imperceptible framework strikes, known as versatility-based avoidance, where an adversary partitions an unsafe payload in a manner that no part can be recognized by ebb and flow ensuring strategies, for example, the most cutting edge framework assault acknowledgment procedures working in condition full method. Snort is a free Network Intrusion Detection System blending several benefits provided by trademark, strategy, and variation from the norm focused examination and is respected to be the most regularly executed IDS/IPS mechanical advancement globally. This report recommends various changes for improving Snort Security Platform and different gathering is suggested to strengthen the measure of rays which can be inspected, and Snort's multi-threading open doors are scrutinized.
引用
收藏
页码:573 / 583
页数:11
相关论文
共 50 条
  • [1] MEASURING INCONSISTENCY IN A NETWORK INTRUSION DETECTION RULE SET BASED ON SNORT
    Mcareavey, Kevin
    Liu, Weiru
    Miller, Paul
    Mu, Kedian
    [J]. INTERNATIONAL JOURNAL OF SEMANTIC COMPUTING, 2011, 5 (03) : 281 - 322
  • [2] Efficient Snort Rule Generation using Evolutionary computing for Network Intrusion Detection
    Muthuregunathan, Raghavan
    Siddharth, S.
    Srivathsan, R.
    Rajesh, S. R.
    [J]. 2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009), 2009, : 336 - 341
  • [3] AUTOMATION SNORT RULE FOR XSS DETECTION WITH HONEYPOT
    Syaifuddin
    Risqiwati, Diah
    Sidharta, Hanugra Aulia
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI 2018), 2018, : 584 - 588
  • [4] Rule generalisation in intrusion detection systems using SNORT
    Aickelin, Uwe
    Twycross, Jamie
    Hesketh-Roberts, Thomas
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (01) : 101 - 116
  • [5] An Ontology for SNORT Rule
    Khurat, Assadarat
    Sawangphol, Wudhichart
    [J]. 2019 16TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE 2019), 2019, : 49 - +
  • [6] Combining Spark and Snort Technologies for Detection of Network Attacks and Anomalies: Assessment of Performance for the Big Data Framework
    Kotenko, Igor
    Komashinsky, Nikolay
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [7] Countering Interest flooding DDoS attacks in NDN Network
    Sul, DongMyung
    Byun, Sung Hyuk
    Lee, Jongseck
    Ko, Namseok
    [J]. 12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 1412 - 1414
  • [8] Countering Entropy Measure Attacks on Packed Software Detection
    Ugarte-Pedrero, Xabier
    Santos, Igor
    Sanz, Borja
    Laorden, Carlos
    Bringas, Pablo Garcia
    [J]. 2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 164 - 168
  • [9] Improving Intrusion Detection System Based on Snort Rules for Network Probe Attacks Detection with Association Rules Technique of Data Mining
    Khamphakdee, Nattawat
    Benjamas, Nunnapus
    Saiyod, Saiyan
    [J]. JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2015, 8 (03) : 234 - 250
  • [10] Rule-Based Network Intrusion Detection System for Port Scanning with Efficient Port Scan Detection Rules Using Snort
    Patel, Satyendra Kumar
    Sonker, Abhilash
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (06): : 339 - 350