ABSTRACT
Currently, information security is a significant challenge in the information era because businesses store critical information in databases. Therefore, databases need to be a secure component of an enterprise. Organizations use Intrusion Detection Systems (IDS) as a security infrastructure component, of which a popular implementation is Snort. In this paper, we provide an overview of Snort and evaluate its ability to detect SQL Injection attacks.
- R. Santos, J. Bernardino, and M. Vieira, "Approaches and Challenges in Database Intrusion Detection", SIGMOD Record, vol. 43, no. 3, pp 36--47, 2014. Google ScholarDigital Library
- W. Park, and S. Ahn, "Performance Comparison and Detection Analysis in Snort and Suricata Environment", Springer Science+Business Media New York 2016, 2016.Google Scholar
- A. Milenkoski, M. Vieira, S. Kounev, A. Avritzer, and B. D. Payne, "Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices", ACM Computing Surveys, vol. 48, no. 1, pp. 12--61, 2015. Google ScholarDigital Library
- D. Singh, D. Patel, B. Borisaniya, and C. Modi, "Collaborative IDS Framework for Cloud", International Journal of Network Security, vol.18, no. 4, pp. 699--709, 2016Google Scholar
- Victor, Truica. Understanding the Snort architecture, 2014. Available: http://truica-victor.com/snort-architecture/. {Accessed: 28-March-2016}.Google Scholar
- D. Kindy, and A. Pathan, "A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies", International Journal, pp. 1--13, 2012Google Scholar
- Testing Snort with SQL Injection Attacks
Recommendations
Study of snort-based IDS
ICWET '10: Proceedings of the International Conference and Workshop on Emerging Trends in TechnologyGeneral trend in industry is a shift from Intrusion Detection Systems (IDS) to Intrusion Prevention Systems (IPS). In this paper, we have investigated the motivations behind this trend. In addition, we have surveyed some of the available IDS/IPS tools. ...
Overview of intrusion detection and intrusion prevention
InfoSecCD '08: Proceedings of the 5th annual conference on Information security curriculum developmentThis report provides an overview of IPS systems. In the first section a comparison of IDS and IPS is made, where an IPS system is defined as an integration of IDS and a firewall. The second section describes what is needed to set up an IPS system. In ...
Design of a Snort-Based Hybrid Intrusion Detection System
IWANN '09: Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part II: Distributed Computing, Artificial Intelligence, Bioinformatics, Soft Computing, and Ambient Assisted LivingComputer security has become a major problem in our society. In particular, computer network security is concerned with preventing the intrusion of an unauthorized person into a network of computers. An intrusion detection system (IDS) is a tool to ...
Comments