2016
DOI: 10.1007/978-981-10-0129-1_48
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System with Snort in Cloud Computing: Advanced IDS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…Snort comprises five logical components that determine and classify potential malicious attacks or any undesired threat against computer systems and networks ( Ali et al., 2018 ). Finally, interested readers can refer to the following references for the details of the Snort components ( Essid, Jemili & Korbaa, 2021 ; Mishra, Vijay & Tazi, 2016 ; Shah & Issac, 2018 ).…”
Section: Essential Conceptsmentioning
confidence: 99%
“…Snort comprises five logical components that determine and classify potential malicious attacks or any undesired threat against computer systems and networks ( Ali et al., 2018 ). Finally, interested readers can refer to the following references for the details of the Snort components ( Essid, Jemili & Korbaa, 2021 ; Mishra, Vijay & Tazi, 2016 ; Shah & Issac, 2018 ).…”
Section: Essential Conceptsmentioning
confidence: 99%
“…An experimentation showing the efficiency of the method for the discovery of inconsistency, incompleteness and redundancy in access control policy. Mishra et al [6] suggests an advanced way to using snort the popular NIDS on the cloud focusing on securing the network layer specifically and centralizing outputs alerts of the system. This study uses snort rules to detect intrusive behavior rather than simple attacks, yet this approach still has difficulties to detect zero-day attacks and the system needs constant rule updates.…”
Section: Related Workmentioning
confidence: 99%
“…Mishra et al[6] Al-Mousa et al[10] Ghosh et al[11] Sangeetha et al[12] Grobert et al[3] Boggs et al[4] …”
mentioning
confidence: 99%
“…It has the ability to perform real-time traffic analysis on IP networks. It is one of the most widely deployed IDSes and it has been previously deployed on virtualized infrastructures to detect attacks [12]. We installed Snort on each VNF instance.…”
Section: B Snort Ids Applicationmentioning
confidence: 99%