Analysis of Modern Intrusion Detection System

被引:0
|
作者
Titorenko, Aleksey A. [1 ]
Frolov, Alexey A. [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Moscow Engn Phys Inst, Dept Comp Syst & Technol 12, Moscow, Russia
关键词
IDS; IPS; Snort; false positives;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This article observes modern methods and technologies for detecting network intrusions. The advantages and disadvantages of modern intrusion detection devices are considered. The problem of false positives of IDSs and the consequences of such actions are described. There are analyzed malefactors attacks on IDS Snort.
引用
收藏
页码:142 / 143
页数:2
相关论文
共 50 条
  • [31] Application Research on Retrospective Analysis System in Network Intrusion Detection
    Wu, Wei
    Cheng, Nan
    Wang, Yubin
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 624 - 627
  • [32] ATTACK PATTERN ANALYSIS FRAMEWORK FOR MULTIAGENT INTRUSION DETECTION SYSTEM
    Kolaczek, Grzegorz
    Juszczyszyn, Krzysztof
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2008, 1 (03) : 215 - 224
  • [33] Research on Distributed Intrusion Detection System Based on Protocol Analysis
    Qu, Xiaohong
    Liu, Zhijie
    Xie, Xiaoyao
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 421 - 424
  • [34] Analysis on intrusion detection system using machine learning techniques
    Seraphim B.I.
    Poovammal E.
    [J]. Lecture Notes on Data Engineering and Communications Technologies, 2021, 66 : 423 - 441
  • [35] An Intrusion Detection System Based on Polynomial Feature Correlation Analysis
    Li, Qingru
    Tan, Zhiyuan
    Jamdagni, Aruna
    Nanda, Priyadarsi
    He, Xiangjian
    Han, Wei
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 978 - 983
  • [36] PERFORMANCE ANALYSIS OF MACHINE LEARNING TECHNIQUES FOR INTRUSION DETECTION SYSTEM
    Jadhav, Abhijit D.
    Pellakuri, Vidyullatha
    [J]. 2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2019,
  • [37] Asymptotic Analysis of A Fuzzy Based Intrusion Detection System For Zigbee
    Maphatsoe, Tsitso
    Masinde, Muthoni
    [J]. 2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 89 - 96
  • [38] AN EVOLUTIONARY GAME ANALYSIS OF THE INTERACTION WITH FIREWALL AND INTRUSION DETECTION SYSTEM
    Yin, Ying
    Xia, Zi-Chao
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 2787 - +
  • [39] Application and Performance Analysis of Data Preprocessing for Intrusion Detection System
    Jiang, Shuai
    Xu, Xiaolong
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 : 163 - 177
  • [40] Automatic analysis of firewall and network intrusion detection system configurations
    Uribe, Tomas
    Cheung, Steven
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 691 - 715