基于Snort自定义规则的入侵检测系统

{"title":"基于Snort自定义规则的入侵检测系统","authors":"","doi":"10.5121/ijmit.2023.15301","DOIUrl":null,"url":null,"abstract":"These days the security provided by the computer systems is a big issue as it always has the threats of cyber-attacks like IP address spoofing, Denial of Service (DOS), token impersonation, etc. The security provided by the blue team operations tends to be costly if done in large firms as a large number of systems need to be protected against these attacks. This leads these firms to turn to less costly security configurations like IDS Suricata and IDS Snort. The main theme of the project is to improve the services provided by Snort which is a tool used in creating a vague defense against cyber-attacks like DDOS attacks which are done on both physical and network layers. These attacks in turn result in loss of extremely important data. The rules defined in this project will result in monitoring traffic, analyzing it, and taking appropriate action to not only stop the attack but also locate its source IP address. This whole process uses different tools other than Snort like Wireshark, Wazuh and Splunk. The product of this will result in not only the detection of the attack but also the source IP address of the machine on which the attack is initiated and completed. The end product of this research will result in sets of default rules for the Snort tool which will not only be able to provide better security than its previous versions but also be able to provide the user with the IP address of the attacker or the person conducting the attack. The system involves the integration of Wazuh with Snort tool in order to make it more efficient than IDS Suricata which is another intrusion detection system capable of detecting all these types of attacks as mentioned. Splunk is another tool used in this project which increases the firewall efficiency to pass the no. of bits to be scanned and the no. of bits scanned successfully. Wazuh is used in this system as it is the best choice for traffic monitoring and incident response than any other of its alternatives in the market. Since this system is used in firms which are known to handle big amounts of data and for this purpose, we use Splunk tool as it is very efficient in handling big amounts of data. Wireshark is used in this system in order to give the IDS automation in its capability to capture and report the malicious packets found during the network scan. All of this gives the IDS a capability of a low budget automated threat detection system. This paper gives complete guidelines for authors submitting papers for the AIRCC Journals.","PeriodicalId":479518,"journal":{"name":"International Journal of Managing Information Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Intrusion Detection System Using Customized Rules for Snort\",\"authors\":\"\",\"doi\":\"10.5121/ijmit.2023.15301\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"These days the security provided by the computer systems is a big issue as it always has the threats of cyber-attacks like IP address spoofing, Denial of Service (DOS), token impersonation, etc. The security provided by the blue team operations tends to be costly if done in large firms as a large number of systems need to be protected against these attacks. This leads these firms to turn to less costly security configurations like IDS Suricata and IDS Snort. The main theme of the project is to improve the services provided by Snort which is a tool used in creating a vague defense against cyber-attacks like DDOS attacks which are done on both physical and network layers. These attacks in turn result in loss of extremely important data. The rules defined in this project will result in monitoring traffic, analyzing it, and taking appropriate action to not only stop the attack but also locate its source IP address. This whole process uses different tools other than Snort like Wireshark, Wazuh and Splunk. The product of this will result in not only the detection of the attack but also the source IP address of the machine on which the attack is initiated and completed. The end product of this research will result in sets of default rules for the Snort tool which will not only be able to provide better security than its previous versions but also be able to provide the user with the IP address of the attacker or the person conducting the attack. The system involves the integration of Wazuh with Snort tool in order to make it more efficient than IDS Suricata which is another intrusion detection system capable of detecting all these types of attacks as mentioned. Splunk is another tool used in this project which increases the firewall efficiency to pass the no. of bits to be scanned and the no. of bits scanned successfully. Wazuh is used in this system as it is the best choice for traffic monitoring and incident response than any other of its alternatives in the market. Since this system is used in firms which are known to handle big amounts of data and for this purpose, we use Splunk tool as it is very efficient in handling big amounts of data. Wireshark is used in this system in order to give the IDS automation in its capability to capture and report the malicious packets found during the network scan. All of this gives the IDS a capability of a low budget automated threat detection system. This paper gives complete guidelines for authors submitting papers for the AIRCC Journals.\",\"PeriodicalId\":479518,\"journal\":{\"name\":\"International Journal of Managing Information Technology\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-08-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Managing Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5121/ijmit.2023.15301\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Managing Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5121/ijmit.2023.15301","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

如今,计算机系统提供的安全性是一个大问题,因为它总是受到网络攻击的威胁,如IP地址欺骗、拒绝服务(DOS)、令牌冒充等。如果在大型公司中完成,由蓝队操作提供的安全性往往是昂贵的,因为需要保护大量系统免受这些攻击。这导致这些公司转向成本较低的安全配置,如IDS Suricata和IDS Snort。该项目的主要主题是改进Snort提供的服务,Snort是一种用于创建模糊防御网络攻击(如DDOS攻击)的工具,这些攻击在物理层和网络层上进行。这些攻击反过来导致极其重要的数据丢失。本项目中定义的规则将导致监控流量,分析流量,并采取适当的行动,不仅可以阻止攻击,还可以定位其源IP地址。整个过程使用不同的工具,而不是Snort,如Wireshark, Wazuh和Splunk。其结果不仅可以检测到攻击,还可以检测到发起和完成攻击的机器的源IP地址。这项研究的最终结果将产生Snort工具的默认规则集,这些规则集不仅能够提供比以前版本更好的安全性,而且能够向用户提供攻击者或进行攻击的人的IP地址。该系统包括Wazuh与Snort工具的集成,以使其比IDS Suricata更有效,IDS Suricata是另一个能够检测所有这些类型攻击的入侵检测系统。Splunk是本项目中使用的另一个工具,它可以提高防火墙的效率以通过no。要扫描的位和编号。位扫描成功。在这个系统中使用Wazuh,因为它是交通监控和事件响应的最佳选择,而不是市场上任何其他替代品。由于该系统用于已知处理大量数据的公司,为此目的,我们使用Splunk工具,因为它在处理大量数据方面非常有效。在本系统中使用Wireshark是为了使IDS能够自动捕获和报告在网络扫描过程中发现的恶意数据包。所有这些都使IDS具有低预算自动威胁检测系统的能力。本文给出了作者提交AIRCC期刊论文的完整指南。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Intrusion Detection System Using Customized Rules for Snort
These days the security provided by the computer systems is a big issue as it always has the threats of cyber-attacks like IP address spoofing, Denial of Service (DOS), token impersonation, etc. The security provided by the blue team operations tends to be costly if done in large firms as a large number of systems need to be protected against these attacks. This leads these firms to turn to less costly security configurations like IDS Suricata and IDS Snort. The main theme of the project is to improve the services provided by Snort which is a tool used in creating a vague defense against cyber-attacks like DDOS attacks which are done on both physical and network layers. These attacks in turn result in loss of extremely important data. The rules defined in this project will result in monitoring traffic, analyzing it, and taking appropriate action to not only stop the attack but also locate its source IP address. This whole process uses different tools other than Snort like Wireshark, Wazuh and Splunk. The product of this will result in not only the detection of the attack but also the source IP address of the machine on which the attack is initiated and completed. The end product of this research will result in sets of default rules for the Snort tool which will not only be able to provide better security than its previous versions but also be able to provide the user with the IP address of the attacker or the person conducting the attack. The system involves the integration of Wazuh with Snort tool in order to make it more efficient than IDS Suricata which is another intrusion detection system capable of detecting all these types of attacks as mentioned. Splunk is another tool used in this project which increases the firewall efficiency to pass the no. of bits to be scanned and the no. of bits scanned successfully. Wazuh is used in this system as it is the best choice for traffic monitoring and incident response than any other of its alternatives in the market. Since this system is used in firms which are known to handle big amounts of data and for this purpose, we use Splunk tool as it is very efficient in handling big amounts of data. Wireshark is used in this system in order to give the IDS automation in its capability to capture and report the malicious packets found during the network scan. All of this gives the IDS a capability of a low budget automated threat detection system. This paper gives complete guidelines for authors submitting papers for the AIRCC Journals.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信