A Comparative study of Open Source IDSs according to their Ability to Detect Attacks
Abstract
References
Index Terms
- A Comparative study of Open Source IDSs according to their Ability to Detect Attacks
Recommendations
Performance Assessment of Open Source IDS for improving IoT Architecture Security implemented on WBANs
NISS '20: Proceedings of the 3rd International Conference on Networking, Information Systems & SecurityThe evolution of the IoT field and its strong presence in multiple domains has raised new security challenges and concerns, which explain the large number of existing studies on this phenomenon. Despite the fact that many security solutions have been ...
Study of snort-based IDS
ICWET '10: Proceedings of the International Conference and Workshop on Emerging Trends in TechnologyGeneral trend in industry is a shift from Intrusion Detection Systems (IDS) to Intrusion Prevention Systems (IPS). In this paper, we have investigated the motivations behind this trend. In addition, we have surveyed some of the available IDS/IPS tools. ...
Detecting, validating and characterizing computer infections in the wild
IMC '11: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conferenceAlthough network intrusion detection systems (IDSs) have been studied for several years, their operators are still overwhelmed by a large number of false-positive alerts. In this work we study the following problem: from a large archive of intrusion ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 347Total Downloads
- Downloads (Last 12 months)30
- Downloads (Last 6 weeks)4
Other Metrics
Citations
Cited By
View allView Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in