Influence of DoS attacks on intrusion detection systems
暂无分享,去创建一个
All currently existing IDS are vulnerable to attacks and have various degrees of weakness. Our goal was to undertake the diagnostic of the most popular IDS and to identify its key weak points. For the purpose of this work, we examined Network-based IDS. We analyzed the responses of ID Systems to denial-of-service attacks. All tested systems were more or less vulnerable to this kind of attacks. The analysis of testing allowed to develop mathematical models, based on the game theory, and also the methodology and the criteria for assessment of reliability of a specific ID system. The research undertaken evidences that IDS cannot be absolutely safe and secure, and provides data which can be used for the configuration of such systems to enhance their reliability and fault tolerance.
[1] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[2] Martin J. Reed,et al. Methodologies for detecting DoS/DDoS attacks against network servers , 2012, ICSNC 2012.
[3] Ikerionwu Charles,et al. Game Theory Basics and Its Application in Cyber Security , 2017 .