Abstract
Phones are turning into the surely understood method for relationship; strategies helping adaptability connote a genuine asset of issues in light of the fact that their preparatory style did not execute effective assurance. A novel structure work of turn imperceptible framework strikes, known as versatility-based avoidance, where an adversary partitions an unsafe payload in a manner that no part can be recognized by ebb and flow ensuring strategies, for example, the most cutting edge framework assault acknowledgment procedures working in condition full method. Snort is a free Network Intrusion Detection System blending several benefits provided by trademark, strategy, and variation from the norm focused examination and is respected to be the most regularly executed IDS/IPS mechanical advancement globally. This report recommends various changes for improving Snort Security Platform and different gathering is suggested to strengthen the measure of rays which can be inspected, and Snort’s multi-threading open doors are scrutinized.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Albin, N. Rowe, A realistic experimental comparison of the Suricata and Snort intrusion-detection systems, in: Enokido, T. (Ed.), Proc. 26th Int. Conf. Advanced Information Networking and Applications, WAINA’12. IEEE, Los Alamitos, CA, March 2012, pp. 122–127.
Butun, S.D. Morgera, R. Sankar, A survey of intrusion detection systems in wireless sensor networks, Commun. Surv. Tutorials 16 (1) (2014) 266–282.
A Collaborative Framework for Intrusion Detection in Mobile Networks” by Mauro Andreolini, Michele Colajanni, Mirco Marchetti, proceedings in Information Sciences 321 (2015) 179–192.
T. Alpcan, C. Bauckhage, A.D. Schmidt, A probabilistic diffusion scheme for anomaly detection on smartphones, in: P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis, D. Sauveron (Eds.), Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, Springer, Berlin, DE, 2010, pp. 31–46.
M. Colajanni, M. Marchetti, A parallel architecture for stateful intrusion detection in high traffic networks, in: G. Carle (Ed.), Proc. 1st Workshop on Monitoring, Attack Detection and Mitigation, MonAM’06, IEEE, Los Alamitos, CA, 2006, pp. 9–16.
M. Andreolini, S. Casolari, M. Colajanni, M. Marchetti, Dynamic load balancing for network intrusion detection systems based on distributed architectures, in: M. Wolf, F. Quaglia, D. Avresky (Eds.), Proc. 6th Int. Symp. Network Computing and Applications, NCA’07, IEEE, Los Alamitos, CA, 2007, pp. 153–160.
M. Becher, F. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck, C. Wolf, Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices, in: D. Frincke (Ed.), Proc. Int. Symp. Security and Privacy, SP’11, IEEE, Los Alamitos, CA, 2011, pp. 96–111.
L.D. Carli, R. Sommer, S. Jha, Beyond pattern matching: a concurrency model for stateful deep packet inspection, in: Proc. 21st Conf. Computer and Communications Security, SIGSAC’14, ACM, New York City, NY, 2014, pp. 1378–1390.
M. Colajanni, D. Gozzi, M. Marchetti, Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems, in: R. Yavatkar, D. Grunwald, K. Ramakrishnan (Eds.), Proc. 3rd Int. Symp. Architectures for Networking and Communication Systems, ANCS’07, ACM, New York City, NY, 2007, pp. 165–174.
M. Colajanni, L.D. Zotto, M. Marchetti, M. Messori, Defeating NIDS evasion in mobile IPv6 networks, in: L. Bononi, A. Banchs (Eds.), Proc. 1st Int. Symp. World of Wireless Mobile and Multimedia Networks, WoWMoM’11, IEEE, Los Alamitos, CA, 2011, pp. 1–9.
M. Colajanni, L.D. Zotto, M. Marchetti, M. Messori, The problem of NIDS evasion in mobile networks, in: T.E. Ghazawi, L. Fratta (Eds.), Proc. 4th Int. Conf. New Technologies, Mobility and Security, NTMS’11, IEEE, Los Alamitos, CA, 2011, pp. 1–6.
M. Curti, A. Merlo, M. Migliardi, S. Schiappacasse, Towards energy-aware intrusion detection systems on mobile devices, in: Proc. 1st Int. Conf. High Performance Computing and Simulation, HPCS’13, IEEE, Los Alamitos, CA, 2013, pp. 289–296.
P. Garcia-Teodoro, J.E. Diaz-Verdejo, G. Macia-Fernandez, E. Vazquez, Anomaly-based network intrusion detection: techniques, systems and challenges, Comput. Secur. 28 (1) (2009) 18–28.
L. Etienne, \A short Snort rulesets analysis,” tech. rep., CERN CERT, 2009.
D. Bon_glio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli, \Revealing skype tra_c: when randomness plays
with you,” SIGCOMM Comput. Commun. Rev., vol. 37, no. 4, pp. 37{48, 2007.
S. A. Baset and H. G. Schulzrinne, \An analysis of the skype peer-to-peer internet telephony protocol,” in INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings, pp. 1{11,2006.
E. Freire, A. Ziviani, and R. Salles, \Detecting skype rows in web traffic,” in Network Operations and Management Symposium, 2008. NOMS 2008. IEEE, pp. 89{96, April 2008.
F. D. P. Biondi, \Silver Needle in the Skype.” Black Hat Europe’06, Amsterdam, the Netherlands, Mar. 2006.
D. B. Y. Kulbak, \The eMule Protocol Specification.” DANSS, Hebrew University of Jerusalem, Jan. 2005.
Oinkmaster.” http://oinkmaster.sourceforge.net, cited June 2009.
Dumbpig-Automated checking for Snort rulesets.” http://leonward.wordpress.com/2009/06/07/dumbpig-automated-checking-for-snort-rulesets/, cited July 2009.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Somu, V., Kamesh, D.B.K., Sastry, J.K.R., Sitara, S.N.M. (2017). Snort Rule Detection for Countering in Network Attacks. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 515. Springer, Singapore. https://doi.org/10.1007/978-981-10-3153-3_57
Download citation
DOI: https://doi.org/10.1007/978-981-10-3153-3_57
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3152-6
Online ISBN: 978-981-10-3153-3
eBook Packages: EngineeringEngineering (R0)