Analysis of Modern Intrusion Detection System

被引:0
|
作者
Titorenko, Aleksey A. [1 ]
Frolov, Alexey A. [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Moscow Engn Phys Inst, Dept Comp Syst & Technol 12, Moscow, Russia
来源
PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS) | 2018年
关键词
IDS; IPS; Snort; false positives;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This article observes modern methods and technologies for detecting network intrusions. The advantages and disadvantages of modern intrusion detection devices are considered. The problem of false positives of IDSs and the consequences of such actions are described. There are analyzed malefactors attacks on IDS Snort.
引用
收藏
页码:142 / 143
页数:2
相关论文
共 50 条
  • [1] Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
    Ashoor, Asmaa Shaker
    Gore, Sharad
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 497 - +
  • [2] VoIP Intrusion Detection System with Snort
    Ciz, Pavol
    Labaj, Ondrej
    Podhradsky, Pavol
    Londak, Juraj
    PROCEEDINGS ELMAR-2012, 2012, : 137 - 140
  • [3] Influence of DoS Attacks on Intrusion Detection Systems
    Titorenko, Aleksey A.
    Goncharov, Dmitry E.
    PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2018, : 144 - 146
  • [4] A Simple Statistical Analysis Approach for Intrusion Detection System
    Waskita, A. A.
    Suhartanto, H.
    Persadha, P. D.
    Handoko, L. T.
    2013 IEEE CONFERENCE ON SYSTEMS, PROCESS & CONTROL (ICSPC), 2013, : 193 - 197
  • [5] Platform based on an embedded system to evaluate the intrusion detection system
    Saber, Mohammed
    Emharref, Mohamed
    Bouchentouf, Toumi
    Benazzi, Abdelhamid
    2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 894 - 899
  • [6] General Study of Intrusion Detection System and Survey of Agent Based Intrusion Detection System
    Saxena, Aumreesh Ku.
    Sinha, Sitesh
    Shukla, Piyush
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 417 - 421
  • [7] Analysis of Intrusion Management System Technology
    Wang, Yaohui
    Huang, Xiaobo
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [8] Performance Analysis of Snort-based Intrusion Detection System
    Garg, Akash
    Maheshwari, Prachi
    2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
  • [9] Honeypot-Based Intrusion Detection System: A Performance Analysis
    Kondra, Janardhan Reddy
    Bharti, Santosh Kumar
    Mishra, Sambit Kumar
    Babu, Korra Sathya
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2347 - 2351
  • [10] Hybrid Intrusion Detection System
    Adhao, Rahul B.
    Mahefuj, Samadhan J.
    Pachghare, Vinod K.
    Khadse, Vijay M.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (05): : 573 - 579