PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Testing of IDS model using several intrusion detection tools

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The aim of this work is to provide set of selected tests on IDS model that would enlarge the functionality of intrusion detection systems. Designed model is using several IDS, which allows it to investigate larger bandwidth and capture more attacks. This system consists of central master node and devices on which the intrusion detection systems are. The tests were designed with the attribute of repeatability and universality. They are divided into five categories which explore specific attributes of intrusion detection system.
Rocznik
Strony
55--62
Opis fizyczny
Bibliogr. 9 poz., rys., tab.
Twórcy
autor
  • Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics Technical University of Košice, Slovakia
  • Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics Technical University of Košice, Slovakia
  • Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics Technical University of Košice, Slovakia
Bibliografia
  • [1] Pintello T., Introduction to Networking with Network, John Wiley & Sons, New Jersey 2013, 142-143.
  • [2] Calvo Moya M.A., Analysis and evaluation of the Snort and Bro network intrusion detection systems, Proyecto de fin de carrera, Universidad Pontificia Commillas, Madrid, Sep. 2008.
  • [3] White J.S., Fitzsimmon T.T., Matthews J.N., Quantitative analysis of intrusion detection systems: SPIE Procedings 8757, Cyber Sensing 2013, 1-13.
  • [4] Antonatos S., Anagnostakis K.G., Markatos E.P., Generating realistic workloads for network intrusion detection systems, ACM SIGSOFT Software Engineering Notes, January 2004, 29, 1, 207-215.
  • [5] Evans D.L., Bond P.J., Bement A.L., An Overview of Issues in Testing Intrusion Detection Systems, U.S. Department of Commerce, Technology Administration National Institute of Standards and Technology. Gaithersburg 2003, 2-18.
  • [6] Botta A., Dainotti A., Pescapé A., A tool for the generation of realistic network workload for emerging networking scenarios, Computer Networks 2012, 56, 15, 3531-3547.
  • [7] Damaye S., Pytbull. [Online] [2013-12-6] http://pytbull. sourceforge.net/index.php?page=home
  • [8] Rehman Rafeeq: Intrusion Detection Systems with Snort. Pearson Education, New Jersey 2003, 0-13-140733-3, 8-23.
  • [9] Vokorokos L., Ennert M., Čajkovský M., Turinská A., A distributed network intrusion detection architecture based on computer stations using GPGPU, IEEE 17th International Conference on Intelligent Engineering Systems: proceedings: June 19-21, 2013, Budapest: IEEE, 2013, 323-326.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-c5283fe7-9374-4ded-8d86-7a5a45fe8225
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.