Show simple item record

dc.contributor.authorAlhomoud, Adeeb M.*
dc.contributor.authorMunir, Rashid*
dc.contributor.authorPagna Disso, Jules F.*
dc.contributor.authorAl-Dhelaan, A.*
dc.contributor.authorAwan, Irfan U.*
dc.date.accessioned2011-11-17T17:56:44Z
dc.date.available2011-11-17T17:56:44Z
dc.date.issued17/08/2011
dc.identifier.citationAlhomoud A, Munir R, Pagna Disso J, Awan I and Al-Dhelaan A (2011) Performance Evaluation Study of Intrusion Detection Systems. The 2nd International Conference on Ambient Systems, Networks and Technologies (ANT). Procedia Computer Science. 5: 173-180.en_US
dc.identifier.urihttp://hdl.handle.net/10454/5224
dc.description.abstractWith the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Network Intrusion Detection / Prevention Systems NIDS. Today, number of open sources and commercial Intrusion Detection Systems are available to match enterprises requirements but the performance of these Intrusion Detection Systems is still the main concern. In this paper, we have tested and analyzed the performance of the well know IDS system Snort and the new coming IDS system Suricata. Both Snort and Suricata were implemented on three different platforms (ESXi virtual server, Linux 2.6 and FreeBSD) to simulate a real environment. Finally, in our results and analysis a comparison of the performance of the two IDS systems is provided along with some recommendations as to what and when will be the ideal environment for Snort and Suricata.en_US
dc.language.isoenen_US
dc.subjectAttacksen_US
dc.subject; Intrusion Detection Systems (IDS)en_US
dc.subject; Trafficen_US
dc.subject; Performance evaluationen_US
dc.subject; Packet dropsen_US
dc.subject; Suricataen_US
dc.subject; Snorten_US
dc.subject; Alertsen_US
dc.subject; Network securityen_US
dc.titlePerformance Evaluation Study of Intrusion Detection Systems.en_US
dc.status.refereedYesen_US
dc.typeConference paperen_US
dc.type.versionNo full-text available in the repositoryen_US
dc.identifier.doihttps://doi.org/10.1016/j.procs.2011.07.024


This item appears in the following Collection(s)

Show simple item record