Nothing Special   »   [go: up one dir, main page]

Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 515))

Abstract

Phones are turning into the surely understood method for relationship; strategies helping adaptability connote a genuine asset of issues in light of the fact that their preparatory style did not execute effective assurance. A novel structure work of turn imperceptible framework strikes, known as versatility-based avoidance, where an adversary partitions an unsafe payload in a manner that no part can be recognized by ebb and flow ensuring strategies, for example, the most cutting edge framework assault acknowledgment procedures working in condition full method. Snort is a free Network Intrusion Detection System blending several benefits provided by trademark, strategy, and variation from the norm focused examination and is respected to be the most regularly executed IDS/IPS mechanical advancement globally. This report recommends various changes for improving Snort Security Platform and different gathering is suggested to strengthen the measure of rays which can be inspected, and Snort’s multi-threading open doors are scrutinized.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Albin, N. Rowe, A realistic experimental comparison of the Suricata and Snort intrusion-detection systems, in: Enokido, T. (Ed.), Proc. 26th Int. Conf. Advanced Information Networking and Applications, WAINA’12. IEEE, Los Alamitos, CA, March 2012, pp. 122–127.

    Google Scholar 

  2. Butun, S.D. Morgera, R. Sankar, A survey of intrusion detection systems in wireless sensor networks, Commun. Surv. Tutorials 16 (1) (2014) 266–282.

    Google Scholar 

  3. A Collaborative Framework for Intrusion Detection in Mobile Networks” by Mauro Andreolini, Michele Colajanni, Mirco Marchetti, proceedings in Information Sciences 321 (2015) 179–192.

    Google Scholar 

  4. T. Alpcan, C. Bauckhage, A.D. Schmidt, A probabilistic diffusion scheme for anomaly detection on smartphones, in: P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis, D. Sauveron (Eds.), Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, Springer, Berlin, DE, 2010, pp. 31–46.

    Google Scholar 

  5. M. Colajanni, M. Marchetti, A parallel architecture for stateful intrusion detection in high traffic networks, in: G. Carle (Ed.), Proc. 1st Workshop on Monitoring, Attack Detection and Mitigation, MonAM’06, IEEE, Los Alamitos, CA, 2006, pp. 9–16.

    Google Scholar 

  6. M. Andreolini, S. Casolari, M. Colajanni, M. Marchetti, Dynamic load balancing for network intrusion detection systems based on distributed architectures, in: M. Wolf, F. Quaglia, D. Avresky (Eds.), Proc. 6th Int. Symp. Network Computing and Applications, NCA’07, IEEE, Los Alamitos, CA, 2007, pp. 153–160.

    Google Scholar 

  7. M. Becher, F. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck, C. Wolf, Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices, in: D. Frincke (Ed.), Proc. Int. Symp. Security and Privacy, SP’11, IEEE, Los Alamitos, CA, 2011, pp. 96–111.

    Google Scholar 

  8. L.D. Carli, R. Sommer, S. Jha, Beyond pattern matching: a concurrency model for stateful deep packet inspection, in: Proc. 21st Conf. Computer and Communications Security, SIGSAC’14, ACM, New York City, NY, 2014, pp. 1378–1390.

    Google Scholar 

  9. M. Colajanni, D. Gozzi, M. Marchetti, Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems, in: R. Yavatkar, D. Grunwald, K. Ramakrishnan (Eds.), Proc. 3rd Int. Symp. Architectures for Networking and Communication Systems, ANCS’07, ACM, New York City, NY, 2007, pp. 165–174.

    Google Scholar 

  10. M. Colajanni, L.D. Zotto, M. Marchetti, M. Messori, Defeating NIDS evasion in mobile IPv6 networks, in: L. Bononi, A. Banchs (Eds.), Proc. 1st Int. Symp. World of Wireless Mobile and Multimedia Networks, WoWMoM’11, IEEE, Los Alamitos, CA, 2011, pp. 1–9.

    Google Scholar 

  11. M. Colajanni, L.D. Zotto, M. Marchetti, M. Messori, The problem of NIDS evasion in mobile networks, in: T.E. Ghazawi, L. Fratta (Eds.), Proc. 4th Int. Conf. New Technologies, Mobility and Security, NTMS’11, IEEE, Los Alamitos, CA, 2011, pp. 1–6.

    Google Scholar 

  12. M. Curti, A. Merlo, M. Migliardi, S. Schiappacasse, Towards energy-aware intrusion detection systems on mobile devices, in: Proc. 1st Int. Conf. High Performance Computing and Simulation, HPCS’13, IEEE, Los Alamitos, CA, 2013, pp. 289–296.

    Google Scholar 

  13. P. Garcia-Teodoro, J.E. Diaz-Verdejo, G. Macia-Fernandez, E. Vazquez, Anomaly-based network intrusion detection: techniques, systems and challenges, Comput. Secur. 28 (1) (2009) 18–28.

    Google Scholar 

  14. L. Etienne, \A short Snort rulesets analysis,” tech. rep., CERN CERT, 2009.

    Google Scholar 

  15. D. Bon_glio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli, \Revealing skype tra_c: when randomness plays

    Google Scholar 

  16. with you,” SIGCOMM Comput. Commun. Rev., vol. 37, no. 4, pp. 37{48, 2007.

    Google Scholar 

  17. S. A. Baset and H. G. Schulzrinne, \An analysis of the skype peer-to-peer internet telephony protocol,” in INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings, pp. 1{11,2006.

    Google Scholar 

  18. E. Freire, A. Ziviani, and R. Salles, \Detecting skype rows in web traffic,” in Network Operations and Management Symposium, 2008. NOMS 2008. IEEE, pp. 89{96, April 2008.

    Google Scholar 

  19. F. D. P. Biondi, \Silver Needle in the Skype.” Black Hat Europe’06, Amsterdam, the Netherlands, Mar. 2006.

    Google Scholar 

  20. D. B. Y. Kulbak, \The eMule Protocol Specification.” DANSS, Hebrew University of Jerusalem, Jan. 2005.

    Google Scholar 

  21. Oinkmaster.” http://oinkmaster.sourceforge.net, cited June 2009.

  22. Dumbpig-Automated checking for Snort rulesets.” http://leonward.wordpress.com/2009/06/07/dumbpig-automated-checking-for-snort-rulesets/, cited July 2009.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Venkateswarlu Somu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Somu, V., Kamesh, D.B.K., Sastry, J.K.R., Sitara, S.N.M. (2017). Snort Rule Detection for Countering in Network Attacks. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 515. Springer, Singapore. https://doi.org/10.1007/978-981-10-3153-3_57

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3153-3_57

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3152-6

  • Online ISBN: 978-981-10-3153-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics