Performance Evaluation of an Intrusion Detection System

被引:1
作者
Saber, Mohammed [1 ]
Chadli, Sara [2 ]
Emharraf, Mohamed [1 ]
El Farissi, Ilhame [1 ]
机构
[1] First Mohammed Univ, Natl Sch Appl Sci, Lab LSE2I, Oujda, Morocco
[2] First Mohammed Univ, Fac Sci, Lab Elect & Syst, Oujda, Morocco
来源
PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2 | 2016年 / 381卷
关键词
Evaluation; Intrusion detection system (IDS); Network security; Performance; Embedded system; Field-Programmable Gate Array (FPGA); SNORT; Traffic generator;
D O I
10.1007/978-3-319-30298-0_52
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks take place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. Research in intrusion detection systems aims to reduce the impact of these attacks. In the recent years, research in intrusion detection systems aims to reduce the impact of attacks, and to evaluate the system. The evaluation of an IDS is a difficult task. We can make the difference between evaluating the effectiveness of an entire system and characteristics of the system components. In this sheet of paper, we present an approach for IDS evaluating based on measurement of its components performance. In this context, we have proposed a hardware platform based on embedded systems for the implementation of an IDS (SNORT) components. After, we tested a system for generating traffics and attacks based on Linux KALI (Backtrack) and Metasploite 3 Framework. The obtained results show the IDS performance is linked to the characteristics of these components. The obtained results show that the performance characteristics of an IDS depends on the performance of its components.
引用
收藏
页码:509 / 517
页数:9
相关论文
共 50 条
[21]   A Performance and Analysis of Misbehaving node in MANET using Intrusion Detection System [J].
Tamilarasan, S. ;
Aramudan .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (05) :258-264
[22]   Hybrid Intrusion Detection System [J].
Adhao, Rahul B. ;
Mahefuj, Samadhan J. ;
Pachghare, Vinod K. ;
Khadse, Vijay M. .
INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (05) :573-579
[23]   Analysis of Intrusion Detection System [J].
Gu Yue-sheng ;
Feng Hong-yu ;
Wang Jian-ping .
COMPONENTS, PACKAGING AND MANUFACTURING TECHNOLOGY, 2011, 460-461 :451-454
[24]   Power Efficient Architecture for Network Intrusion Detection System [J].
Bontupalli, VenkataRamesh ;
Hasan, Raqibul ;
Taha, Tarek M. .
IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON 2014), 2014, :250-254
[25]   Performance of the Network Intrusion Detection Systems [J].
Murthy, M. V. Ramana ;
Kumar, P. Ram ;
Rao, E. Devender ;
Sharma, A. C. ;
Rajender, S. ;
Rambabu, S. .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (10) :198-202
[26]   CLUSTERING UNDER-SAMPLING DATA FOR IMPROVING THE PERFORMANCE OF INTRUSION DETECTION SYSTEM [J].
Aziz, Mohammad Nasrul ;
Ahmad, Tohari .
JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2021, 16 (02) :1342-1355
[27]   Review on Intrusion Detection System Based on The Goal of The Detection System [J].
Khaleel, Mohammad Khamees ;
Ismail, Mohd Arfian ;
Yunan, Umar ;
Kasim, Shahreen .
INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING, 2018, 10 (06) :197-202
[28]   A Study on IDS (Intrusion Detection System) and Introduction of IFS (Intrusion Filtration System) [J].
Dewanjee, Rita ;
Vyas, Ranjana .
COMPUTING AND NETWORK SUSTAINABILITY, 2017, 12 :119-126
[29]   Survey: Intrusion Detection System in Software-Defined Networking [J].
Janabi, Ahmed H. ;
Kanakis, Triantafyllos ;
Johnson, Mark .
IEEE ACCESS, 2024, 12 :164097-164120
[30]   An Intrusion Detection System Based on Hadoop [J].
Shi, Zhiguo ;
An, Jianwei .
IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, :826-830