{"title":"基于snort的入侵检测系统性能分析","authors":"Akash Garg, P. Maheshwari","doi":"10.1109/ICACCS.2016.7586351","DOIUrl":null,"url":null,"abstract":"The most important purpose of intrusion detection system is to identify attacks against information systems. It is a security method attempting to identify various attacks. Snort is mostly used signature based IDS because it is an open source software. It is used world widely in intrusion detection and prevention domain. In this paper, we used IDEVAL data set we detect attacks using Snort on this dataset.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"32","resultStr":"{\"title\":\"Performance analysis of Snort-based Intrusion Detection System\",\"authors\":\"Akash Garg, P. Maheshwari\",\"doi\":\"10.1109/ICACCS.2016.7586351\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The most important purpose of intrusion detection system is to identify attacks against information systems. It is a security method attempting to identify various attacks. Snort is mostly used signature based IDS because it is an open source software. It is used world widely in intrusion detection and prevention domain. In this paper, we used IDEVAL data set we detect attacks using Snort on this dataset.\",\"PeriodicalId\":176803,\"journal\":{\"name\":\"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)\",\"volume\":\"01 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"32\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACCS.2016.7586351\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACCS.2016.7586351","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance analysis of Snort-based Intrusion Detection System
The most important purpose of intrusion detection system is to identify attacks against information systems. It is a security method attempting to identify various attacks. Snort is mostly used signature based IDS because it is an open source software. It is used world widely in intrusion detection and prevention domain. In this paper, we used IDEVAL data set we detect attacks using Snort on this dataset.