Design of a Snort-Based Hybrid Intrusion Detection System

被引:0
|
作者
Gomez, J. [1 ]
Gil, C. [2 ]
Padilla, N. [1 ]
Banos, R. [2 ]
Jimenez, C. [1 ]
机构
[1] Univ Almeria, Dept Lenguajes & Computac, Carretera Sacramento S-N, Almeria, Spain
[2] Univ Almeria, Dept Arquitectura Computadores & Elect, Almeria 04120, Spain
关键词
Intrusion detection systems; anomaly detection; Network IDS; Snort;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Computer security has become a major problem in our society. In particular, computer network security is concerned with preventing the intrusion of an unauthorized person into a network of computers. An intrusion detection system (IDS) is a tool to monitor the network traffic and users' activity with the aim of distinguishing between hostile and non-hostile traffic. Snort is an IDS available under GPL, which allows pattern search. This paper presents a new anomaly pre-processor that extends the functionality of Snort IDS, making it a hybrid IDS.
引用
收藏
页码:515 / +
页数:3
相关论文
共 50 条
  • [31] A hybrid intelligent agent based intrusion detection system
    Jaisankar, N.
    Kannan, A.
    Journal of Computational Information Systems, 2011, 7 (08): : 2608 - 2615
  • [32] Hybrid Intrusion Detection System
    Adhao, Rahul B.
    Mahefuj, Samadhan J.
    Pachghare, Vinod K.
    Khadse, Vijay M.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (05): : 573 - 579
  • [33] AN AGENT-BASED HYBRID INTRUSION DETECTION SYSTEM
    Paulins, Nauris
    RESEARCH FOR RURAL DEVELOPMENT 2011, VOL 1, 2011, : 191 - 195
  • [34] On the fly pattern matching for intrusion detection with Snort
    Abbes, T
    Bouhoula, A
    Rusinowitch, M
    ANNALS OF TELECOMMUNICATIONS, 2004, 59 (9-10) : 1045 - 1071
  • [35] MEASURING INCONSISTENCY IN A NETWORK INTRUSION DETECTION RULE SET BASED ON SNORT
    Mcareavey, Kevin
    Liu, Weiru
    Miller, Paul
    Mu, Kedian
    INTERNATIONAL JOURNAL OF SEMANTIC COMPUTING, 2011, 5 (03) : 281 - 322
  • [36] Framework of Intrusion Detection System via Snort Application on Campus Network Environment
    Ismail, Mohd Nazri
    Ismail, Mohd Taha
    INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATIONS, PROCEEDINGS, 2009, : 455 - 459
  • [37] Performance comparison of intrusion detection systems and application of machine learning to Snort system
    Shah, Syed Ali Raza
    Issac, Biju
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 157 - 170
  • [38] Build snort plus SQL server plus acid intrusion detection system
    An, Zhiyuan
    Liu, Haiyan
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 1, 2008, : 947 - 951
  • [39] A categorical survey of state-of-the-art intrusion detection system-Snort
    Gupta A.
    Sharma L.S.
    International Journal of Information and Computer Security, 2020, 13 (3-4) : 337 - 356
  • [40] Effectiveness Analysis of Public Rule Sets Used in Snort Intrusion Detection System
    Gundogdu, Ilayda
    Selcuk, Ali Aydin
    Ozarslan, Suleyman
    29TH IEEE CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS (SIU 2021), 2021,