Analysis of Modern Intrusion Detection System

被引:0
作者
Titorenko, Aleksey A. [1 ]
Frolov, Alexey A. [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Moscow Engn Phys Inst, Dept Comp Syst & Technol 12, Moscow, Russia
来源
PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS) | 2018年
关键词
IDS; IPS; Snort; false positives;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This article observes modern methods and technologies for detecting network intrusions. The advantages and disadvantages of modern intrusion detection devices are considered. The problem of false positives of IDSs and the consequences of such actions are described. There are analyzed malefactors attacks on IDS Snort.
引用
收藏
页码:142 / 143
页数:2
相关论文
共 50 条
  • [21] Traffic and attack pattern analysis for multiagent distributed intrusion detection system
    Kolaczek, Grzegorz
    Juszczyszyn, Krzysztof
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (ISKE 2007), 2007,
  • [22] Integrated Intrusion Detection and Prevention System with Honeypot in Cloud Computing
    Ravji, Sajaan
    Ali, Maaruf
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 95 - 100
  • [23] Implementation of intrusion detection system and improvement utilising genetic algorithm
    Huang, Ke
    Sun, Bichuan
    Sun, Xianming
    Shabaz, Mohammad
    Khan, Rijwan
    INTERNATIONAL JOURNAL OF NANOTECHNOLOGY, 2023, 20 (5-10) : 600 - 614
  • [24] A Hybrid Intrusion Detection System: A Review
    Garg, Akash
    Maheshwari, Prachi
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [25] Research on Reconfigurable Intrusion Detection System
    Zhao Liang
    Zhang Xiao-hui
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 913 - 917
  • [26] Encrusted CRF in Intrusion Detection System
    Jinny, S. Vinila
    Kumari, J. Jaya
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 2, 2015, 325 : 605 - 613
  • [27] Intrusion detection system: A comprehensive review
    Liao, Hung-Jen
    Lin, Chun-Hung Richard
    Lin, Ying-Chih
    Tung, Kuang-Yuan
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 16 - 24
  • [28] A NOVEL INTRUSION DETECTION SYSTEM FOR MANETS
    Panos, Christoforos
    Xenakis, Christos
    Stavrakakis, Ioannis
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 25 - 34
  • [29] A Brief Introduction to Intrusion Detection System
    Mohamed, Ashara Banu
    Idris, Norbik Bashah
    Shanmugum, Bharanidharan
    TRENDS IN INTELLIGENT ROBOTICS, AUTOMATION, AND MANUFACTURING, 2012, 330 : 263 - 271
  • [30] Performance Evaluation of an Intrusion Detection System
    Saber, Mohammed
    Chadli, Sara
    Emharraf, Mohamed
    El Farissi, Ilhame
    PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, 381 : 509 - 517