2015 Second International Conference on Information Security and Cyber Forensics (InfoSec) 2015
DOI: 10.1109/infosec.2015.7435523
|View full text |Cite
|
Sign up to set email alerts
|

Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0
3

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 5 publications
0
8
0
3
Order By: Relevance
“…The IDS studies [5,[19][20][21][22][23][24][25][26][27] also have proposed attack detection based on Raspberry Pi. In the work of [18], the anomaly-based detection method was proposed by capturing the previous traffic patterns asbenign data for attack detection system construction.…”
Section: Raspberry Pi-based Idsmentioning
confidence: 99%
See 1 more Smart Citation
“…The IDS studies [5,[19][20][21][22][23][24][25][26][27] also have proposed attack detection based on Raspberry Pi. In the work of [18], the anomaly-based detection method was proposed by capturing the previous traffic patterns asbenign data for attack detection system construction.…”
Section: Raspberry Pi-based Idsmentioning
confidence: 99%
“…The work of [21] has implemented a real-time DDoS detection architecture using the complex event processing (CEP) algorithm, and it allowed for real-time analysis of continuous data-streams. Some other studies [14,20,23] have used public IDSs, such as Snort and Bro, to implement the detection system on Raspberry Pi. The study [14] proposed an IDS solution on Raspberry Pi, but its results showed that the number of rules had to be limited owing to their implementation environment, Raspberry Pi.…”
Section: Raspberry Pi-based Idsmentioning
confidence: 99%
“…Due to the limited computing power of early models of the Raspberry Pi, several researchers also began creating Raspberry Pi clusters [7,23,40]. Researchers also use Raspberry Pi clusters to create inexpensive test-beds for various applications, including IDS [26], controls education [21], and software-defined networking [24].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Similarly, in [14], the authors also argued about the infeasibility of deploying Snort in WMNs and proposed a distributed solution called PRactical Intrusion DEtection in resource constrained wireless mesh network (PRIDE). Kyaw et al [17] compared Snort and Bro IDS running on a Raspberry Pi 2, and showed that a Raspberry Pi 2 has enough resources to run open-source IDSs such as Snort or Bro sufficiently fast to detect DoS attacks and port scans. In addition the authors concluded that Snort performed better than Bro on the Raspberry Pi.…”
Section: Related Workmentioning
confidence: 99%