skip to main content
10.1145/1741906.1741914acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicwetConference Proceedingsconference-collections
research-article

Study of snort-based IDS

Published:26 February 2010Publication History

ABSTRACT

General trend in industry is a shift from Intrusion Detection Systems (IDS) to Intrusion Prevention Systems (IPS). In this paper, we have investigated the motivations behind this trend. In addition, we have surveyed some of the available IDS/IPS tools. Real time analysis of several Internet attacks was done using SNORT, "the de facto standard for intrusion detection/prevention", and Nmap in order to study malicious behavior of our network. Simulation results of Scanning attack as well as DoS attack performed on test computer have been provided. A comparative analysis of the results obtained with Snort and EagleX showed the higher efficiency of Snort.

References

  1. Bace, R., & Mell, P., "Intrusion Detection Systems", NIST Special PublicationonIntrusionDetectionSystem. http://www.snort.org/docs/nist-ids.pdf.Google ScholarGoogle Scholar
  2. Cabrera, J., Lewis, L., Qin, L, Lee, W., & Mehra, R., "Proactive Intrusion Detection and Distributed Denial of Service Attacks -- A Case Study in Security Management", Journal of Network and Systems Management, Vol. 10, No. 2, (pp 225--253), 2002, June. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Comer, D. (2004), "Computer Networks and Internets", 4th ed. Upper Saddle River, NJ: Pearson Prentice Hall. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. de Vivo, M., de Vivo, G., & Isern, G., "Internet Security Attacks at the Basic Levels", ACM SIGOPS Operating Systems Review, Vol. 32, No. 2, SIGOPS, ACM, April 1998, (pp 4--15), 1998, April. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Firewall (networking). Wikipedia. http://en.wikipedia.org/wiki/Firewall_%28networking%29Google ScholarGoogle Scholar
  6. Intrusion-detection system. Wikipedia. http://en.wikipedia.org/wiki/Intrusion_detection_systemGoogle ScholarGoogle Scholar
  7. Intrusion-prevention system. Wikipedia. http://en.wikipedia.org/wiki/Intrusion_prevention_systemGoogle ScholarGoogle Scholar
  8. IPS gaining ground over IDS. (2005, February 14). Network World. http://www.networkworld.com/news/2005/021405ids.htmlGoogle ScholarGoogle Scholar
  9. NSS Group. (2004, January). Intrusion Prevention Systems (IPS). http://www.nss.co.uk/WhitePapers/intrusion_prevention_systems.htmGoogle ScholarGoogle Scholar
  10. Oppliger, R., "Internet Security: Firewalls and Beyond", Communications of the ACM, May 1997/Vol. 40, No. 5, (pp 92--102). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Roesch, M., "Snort -- Lightweight Intrusion Detection for Networks", Proceedings of LISA '99: 13th Systems Administration Conference, Seattle, WA, USA, November 7--12, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Snort. http://snort.org/Google ScholarGoogle Scholar
  13. Whitman, M., "Enemy At The Gate: Threats to Information Security", Communications of the ACM, Vol. 46, No. 8, August 2003, (pp 91--95). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Zhang, X., Li, C., & Zheng, W., "Intrusion Prevention System Design", The Fourth International Conference on Computer and InformationTechnology (CIT'04), 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Kistler, U. "Eagle-X Preconfigured Intrusion Detection System" http://www.engagesecurity.com/products/eaglexGoogle ScholarGoogle Scholar

Index Terms

  1. Study of snort-based IDS

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICWET '10: Proceedings of the International Conference and Workshop on Emerging Trends in Technology
      February 2010
      1070 pages
      ISBN:9781605588124
      DOI:10.1145/1741906

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 February 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader