2003
DOI: 10.1007/978-3-540-45248-5_9
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing the Performance of Network Intrusion Detection Sensors

Abstract: Abstract. Network intrusion detection systems (NIDS) are becoming an important tool for protecting critical information and infrastructure. The quality of a NIDS is described by the percentage of true attacks detected combined with the number of false alerts. However, even a high-quality NIDS algorithm is not effective if its processing cost is too high, since the resulting loss of packets increases the probability that an attack is not detected. This study measures and compares two major components of the NID… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
54
0

Year Published

2004
2004
2020
2020

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 73 publications
(56 citation statements)
references
References 11 publications
1
54
0
Order By: Relevance
“…Schaelicke et al [236] propose a methodology to measure the performance of rule-based IDPSs. They performed measurements for different packet payload sizes on a 100Mbit link, which was nearly saturated during the evaluation.…”
Section: Performance Analysis and Optimizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Schaelicke et al [236] propose a methodology to measure the performance of rule-based IDPSs. They performed measurements for different packet payload sizes on a 100Mbit link, which was nearly saturated during the evaluation.…”
Section: Performance Analysis and Optimizationmentioning
confidence: 99%
“…The evaluation of the IDPS performance for any given security configuration is a crucial step for improving their realtime capability [236].…”
Section: Analysis 41 Introductionmentioning
confidence: 99%
“…Those that are most relevant to our work include papers that deal with problems related to the capacity and resource management in NIDS including [7], [9], [15], [17]. Of particular relevance is the study by Dreger et al in [5] which reports real world experiences with the Bro.…”
Section: Related Workmentioning
confidence: 99%
“…Although many IDPS systems have been proposed, their appropriate configuration and control for effective detection and prevention of attacks has always been far from trivial [5]. Another concern is related to the significant slowing down of system performance when maximum security is applied [3], [14]; hence arises the need to tradeoff between security enforcement levels on one side and the performance and usability of an enterprise information system on the other.…”
Section: Introductionmentioning
confidence: 99%