Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3320326.3320383acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnissConference Proceedingsconference-collections
research-article

A Comparative study of Open Source IDSs according to their Ability to Detect Attacks

Published: 27 March 2019 Publication History

Abstract

In this paper, we focus on the important role of intrusion detection systems for detecting unauthorized actions initiated from both internal and external network by collecting and monitoring network traffic. We give a study of the open source Next-Generation of IDS (SNORT, SURICATA, BRO). We test and compare their ability to detect attacks and performance by implementing the three IDSs individually.

References

[1]
G. Nadiammai and M. Hemalatha, "Effective approach toward intrusion detection system using data mining techniques," Egyptian Informatics Journal, vol. 15, no. 1, pp. 37--50, 2014.
[2]
P. Schwab, "The History of Intrusion Detection Systems (IDS) -- Part 1 Threat Stack," 2015.
[3]
U. Lindqvist and P. A. Porras, "Detecting computer and network misuse through the production-based expert system toolset (p-best)," in Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), 1999, pp. 146--161.
[4]
A. Patcha and J.-M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends," Computer Networks, vol. 51, no. 12, pp. 3448--3470, 2007.
[5]
T.-H. Cheng, Y.-D. Lin, Y.-C. Lai, and P.-C. Lin, "Evasion techniques: Sneaking through your intrusion detection/prevention systems," IEEE Communications Surveys Tutorials, vol. 14, no. 4, pp. 1011--1020, 2012.
[6]
P. PWC, "Managing cyber risks in an interconnected world: Key findings from the global state of information security survey 2015", 2015."
[7]
Koch, Robert. 2011. Towards Next-Generation Intrusion Detection. 2011.
[8]
R.K Meena, H Kaur, K Sharma, S Kaur,S sharma. 2018." Integrated Next-Generation Network Security Model." 2018.
[9]
A. Boiko and V. Shendryk, "System integration and security of information systems," Procedia Computer Science, vol. 104, no. Supplement C, pp. 35--42, 2017, iCTE 2016, Riga Technical University, Latvia.
[10]
J. T. Rødfoss, "Comparison of open source network intrusion detection systems," Master's thesis, 2011.
[11]
G. Nadiammai and M. Hemalatha, "Effective approach toward intrusion detection system using data mining techniques," Egyptian Informatics Journal, vol. 15, no. 1, pp. 37--50, 2014.
[12]
Vern Paxson "BRO: A System for Detecting Network Intruders in Real-Time", January 26-29, 1998
[13]
Bilal Maqbool Beigh,Uzair Bashir,Manzoor Chachoo "Intrusion Detection and Prevention System: Issues and Challenges",2013
[14]
Kittikhun Thongkanchorn, Sudsanguan Ngamsuriyaroj, Vasaka Visoottiviseth "Evaluation Studies of Three Intrusion Detection Systems under Various Attacks and Rule Sets"
[15]
M. Faqih Ridho Fatah Yasin, S.T., M.T. Yusuf Sulistyo N, S.T., M.Eng "ANALYSIS AND EVALUATION SNORT, BRO, AND SURICATA AS INTRUSION DETECTION SYSTEM BASED ON LINUX SERVER",2014
[16]
Eugene Albin "A COMPARATIVE ANALYSIS OF THE SNORT AND SURICATA INTRUSION-DETECTION SYSTEMS", 2011
[17]
P. Mehra, "A brief study and comparison of snort and bro open source network intrusion detection systems," International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, no. 6, pp. 383--386, 2012.
[18]
"Snort - Network Intrusion Detection and Prevention System." {Online}. Available:https://www.snort.org/
[19]
"Suricata | Open Source IDS / IPS / NSM engine." {Online}. Available: https://suricata-ids.org/
[20]
"Bro Manual --- Bro 2.5.1 documentation." {Online}. Available: https://www.bro.org/sphinx/
[21]
M. Pihelgas, R. Vaarandi, "A comparative analysis of open-source intrusion detection systems," Master'sThesis, Tallinn University of Technology, 2012.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
NISS '19: Proceedings of the 2nd International Conference on Networking, Information Systems & Security
March 2019
512 pages
ISBN:9781450366458
DOI:10.1145/3320326
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 March 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Attacks
  2. BRO
  3. Intrusion Detection Systems
  4. Malware
  5. Network Security
  6. SNORT
  7. SURICATA

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

NISS19

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 347
    Total Downloads
  • Downloads (Last 12 months)30
  • Downloads (Last 6 weeks)4
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media