2008 International Conference on Innovations in Information Technology 2008
DOI: 10.1109/innovations.2008.4781733
|View full text |Cite
|
Sign up to set email alerts
|

Boosting throughput of Snort NIDS under Linux

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…They examine the performance of both systems as they scale system resources such as the number of CPU cores, the rule sets used and the workloads processed. There are other works that looks at measuring the intrusion detection capability as in [20], tweaking IDS performance as in [21], parallel design of IDS on many-core processors as in [22], an approach for unifying rule based deep packet inspection as in [23], a Better Snort Intrusion Detection/Prevention System (BSnort) that uses Aho-Corasick automaton as in [24], improving the accuracy of network intrusion detection systems as in [25], boosting throughput of Snort NIDS under Linux as in [26], evaluation studies of three IDS under various attacks and rule sets as in [27] etc.…”
Section: Related Work On Performance Comparisonmentioning
confidence: 99%
“…They examine the performance of both systems as they scale system resources such as the number of CPU cores, the rule sets used and the workloads processed. There are other works that looks at measuring the intrusion detection capability as in [20], tweaking IDS performance as in [21], parallel design of IDS on many-core processors as in [22], an approach for unifying rule based deep packet inspection as in [23], a Better Snort Intrusion Detection/Prevention System (BSnort) that uses Aho-Corasick automaton as in [24], improving the accuracy of network intrusion detection systems as in [25], boosting throughput of Snort NIDS under Linux as in [26], evaluation studies of three IDS under various attacks and rule sets as in [27] etc.…”
Section: Related Work On Performance Comparisonmentioning
confidence: 99%
“…The significant ones are as under: frag3, stream5, http_inspect, ftp_telnet, smtp, sfportscan, arpspoof, ssh, dns, imap, pop and reputation. The description of each of the preprocessor is very wide and beyond the scope of this research paper [5], [7]. …”
Section:  Packet Decodermentioning
confidence: 99%
“…One thing must be kept in notice before going further path names must be carefully learnt throughout the installation process and this tool management. The rest of installation is more or less same like the previous installation of the libdnet package [7], [11]. The snort is installed in /etc/snort directory.…”
Section: Snort Installationmentioning
confidence: 99%