Performance analysis of Snort-based Intrusion Detection System

The most important purpose of intrusion detection system is to identify attacks against information systems. It is a security method attempting to identify various attacks. Snort is mostly used signature based IDS because it is an open source software. It is used world widely in intrusion detection and prevention domain. In this paper, we used IDEVAL data set we detect attacks using Snort on this dataset.

[1]  Kai Li,et al.  Research on the intrusion detection technology with hybrid model , 2010, 2010 The 2nd Conference on Environmental Science and Information Application Technology.

[2]  I. Sumaiya Thaseen,et al.  Intrusion detection model using fusion of PCA and optimized SVM , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[3]  Kapil Keshao Wankhade,et al.  An efficient approach for Intrusion Detection using data mining methods , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[4]  Matthew V. Mahoney,et al.  Network traffic anomaly detection based on packet bytes , 2003, SAC '03.

[5]  Lilly Suriani Affendey,et al.  Intrusion detection using data mining techniques , 2010, 2010 International Conference on Information Retrieval & Knowledge Management (CAMP).

[6]  A. Halim Zaim,et al.  A hybrid intrusion detection system design for computer network security , 2009, Comput. Electr. Eng..

[7]  M. Hemalatha,et al.  Effective approach toward Intrusion Detection System using data mining techniques , 2014 .

[8]  Philip K. Chan,et al.  Learning rules for anomaly detection of hostile network traffic , 2003, Third IEEE International Conference on Data Mining.

[9]  M. Hemalatha,et al.  Handling Intrusion Detection System using Snort Based Statistical Algorithm and Semi-supervised Approach , 2013 .

[10]  Philip K. Chan,et al.  PHAD: packet header anomaly detection for identifying hostile network traffic , 2001 .

[11]  Vinod Kumar,et al.  Signature Based Intrusion Detection System Using SNORT , 2012 .

[12]  Divya Surender Lakra HSNORT: A Hybrid Intrusion Detection System using , 2013 .

[13]  Philip K. Chan,et al.  Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.

[14]  Saiyan Saiyod,et al.  Improving Intrusion Detection System based on Snort rules for network probe attack detection , 2014, 2014 2nd International Conference on Information and Communication Technology (ICoICT).