The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
2015
DOI: 10.5614/itbj.ict.res.appl.2015.8.3.4
|View full text |Cite
|
Sign up to set email alerts
|

Improving Intrusion Detection System Based on Snort Rules for Network Probe Attacks Detection with Association Rules Technique of Data Mining

Abstract: Abstract. The intrusion detection system (IDS) is an important network security tool for securing computer and network systems. It is able to detect and monitor network traffic data. Snort IDS is an open-source network security tool. It can search and match rules with network traffic data in order to detect attacks, and generate an alert. However, the Snort IDS can detect only known attacks. Therefore, we have proposed a procedure for improving Snort IDS rules, based on the association rules data mining techni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
3

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 31 publications
(21 citation statements)
references
References 16 publications
0
18
0
3
Order By: Relevance
“…Several methods for improving these systems have been introduced using various approaches [6], [7], [8].…”
Section: Related Workmentioning
confidence: 99%
“…Several methods for improving these systems have been introduced using various approaches [6], [7], [8].…”
Section: Related Workmentioning
confidence: 99%
“…In turn, the alerts are activated and sent to a receiver such as system log, database, management team or even a trap. Many studies have used Snort NIDPS to detect attacks such as DoS and DDoS by developing and designing new rules [13,14,15,16].…”
Section: Snort Network Intrusion Detection and Prevention System (Snomentioning
confidence: 99%
“…Snort utilize with rule to alert the network traffic data. The Snort-IDS rules have two logical parts such as the rule header and the rule option [12] as shown in Figure 1. The rule header.…”
Section: The Background Of Snort-idsmentioning
confidence: 99%
“…The fallibility is abnormal traffic which it is incorrectly Botnets detection as normal traffic. The values is lower that indicates better performance, shown in equations [12]. Note: In Table 9, efficiency of detection and fallibility performance of each datasets which we utilize Botnets attack 1.rules file.…”
Section: Detection Accuracy Comparison Of the Snort-ids Rulesmentioning
confidence: 99%
See 1 more Smart Citation