Performance Evaluation of an Intrusion Detection System

被引:1
|
作者
Saber, Mohammed [1 ]
Chadli, Sara [2 ]
Emharraf, Mohamed [1 ]
El Farissi, Ilhame [1 ]
机构
[1] First Mohammed Univ, Natl Sch Appl Sci, Lab LSE2I, Oujda, Morocco
[2] First Mohammed Univ, Fac Sci, Lab Elect & Syst, Oujda, Morocco
来源
PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2 | 2016年 / 381卷
关键词
Evaluation; Intrusion detection system (IDS); Network security; Performance; Embedded system; Field-Programmable Gate Array (FPGA); SNORT; Traffic generator;
D O I
10.1007/978-3-319-30298-0_52
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks take place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. Research in intrusion detection systems aims to reduce the impact of these attacks. In the recent years, research in intrusion detection systems aims to reduce the impact of attacks, and to evaluate the system. The evaluation of an IDS is a difficult task. We can make the difference between evaluating the effectiveness of an entire system and characteristics of the system components. In this sheet of paper, we present an approach for IDS evaluating based on measurement of its components performance. In this context, we have proposed a hardware platform based on embedded systems for the implementation of an IDS (SNORT) components. After, we tested a system for generating traffics and attacks based on Linux KALI (Backtrack) and Metasploite 3 Framework. The obtained results show the IDS performance is linked to the characteristics of these components. The obtained results show that the performance characteristics of an IDS depends on the performance of its components.
引用
收藏
页码:509 / 517
页数:9
相关论文
共 50 条
  • [1] Performance Evaluation of Different Intrusion Detection System: An Empirical Approach
    Beigh, Bilal Maqbool
    Peer, M. A.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [2] Platform based on an embedded system to evaluate the intrusion detection system
    Saber, Mohammed
    Emharref, Mohamed
    Bouchentouf, Toumi
    Benazzi, Abdelhamid
    2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 894 - 899
  • [3] The Performance Evaluation of Intrusion Detection Evaluation Method Based on Bayesian Theory
    Si, Haiyang
    Fang, Zhiyi
    Li, Ruixue
    Zhang, Jianli
    Li, Wei
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4843 - 4846
  • [4] Design and realization of evaluation environment in the performance analysis of intrusion detection system
    Guiping, Liao
    Fei, Yu
    Yue, Shen
    Linfeng, Zhang
    Cheng, Xu
    PROCEEDINGS OF THE 26TH CHINESE CONTROL CONFERENCE, VOL 6, 2007, : 303 - +
  • [5] Performance Evaluation of Snort and Suricata Intrusion Detection Systems on Ubuntu Server
    Gupta, Alka
    Sen Sharma, Lalit
    PROCEEDINGS OF RECENT INNOVATIONS IN COMPUTING, ICRIC 2019, 2020, 597 : 811 - 821
  • [6] Implementation and Performance Evaluation of Network Intrusion Detection Systems
    Saber, Mohammed
    Ghaouth Belkasmi, Mohammed
    Chadli, Sara
    Emharraf, Mohamed
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 484 - 495
  • [7] Evaluation of the intrusion detection capabilities and performance of a security operation center
    Ganame, Abdoul Karim
    Bourgeois, Julien
    Bidou, Renaud
    Spies, Francois
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 48 - +
  • [8] Intrusion detection system: A comprehensive review
    Liao, Hung-Jen
    Lin, Chun-Hung Richard
    Lin, Ying-Chih
    Tung, Kuang-Yuan
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 16 - 24
  • [9] Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection
    Belavagi, Manjula C.
    Muniyal, Balachandra
    TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 117 - 123
  • [10] Performance Analysis of Snort-based Intrusion Detection System
    Garg, Akash
    Maheshwari, Prachi
    2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,