A Comparative Experimental Design and Performance Analysis of Snort-Based Intrusion Detection System in Practical Computer NetworksReportar como inadecuado


A Comparative Experimental Design and Performance Analysis of Snort-Based Intrusion Detection System in Practical Computer Networks


A Comparative Experimental Design and Performance Analysis of Snort-Based Intrusion Detection System in Practical Computer Networks - Descarga este documento en PDF. Documentación en PDF para descargar gratis. Disponible también para leer online.

School of Science and Technology, Middlesex University, The Burroughs, London NW4 4BT, UK





*

Author to whom correspondence should be addressed.



Academic Editor: Yevgeniya Kovalchuk

Abstract As one of the most reliable technologies, network intrusion detection system NIDS allows the monitoring of incoming and outgoing traffic to identify unauthorised usage and mishandling of attackers in computer network systems. To this extent, this paper investigates the experimental performance of Snort-based NIDS S-NIDS in a practical network with the latest technology in various network scenarios including high data speed and-or heavy traffic and-or large packet size. An effective testbed is designed based on Snort using different muti-core processors, e.g., i5 and i7, with different operating systems, e.g., Windows 7, Windows Server and Linux. Furthermore, considering an enterprise network consisting of multiple virtual local area networks VLANs, a centralised parallel S-NIDS CPS-NIDS is proposed with the support of a centralised database server to deal with high data speed and heavy traffic. Experimental evaluation is carried out for each network configuration to evaluate the performance of the S-NIDS in different network scenarios as well as validating the effectiveness of the proposed CPS-NIDS. In particular, by analysing packet analysis efficiency, an improved performance of up to 10% is shown to be achieved with Linux over other operating systems, while up to 8% of improved performance can be achieved with i7 over i5 processors. View Full-Text

Keywords: network security; intrusion detection system; Snort; parallel processing; network traffic monitoring; experimental performance evaluation network security; intrusion detection system; Snort; parallel processing; network traffic monitoring; experimental performance evaluation





Autor: Imdadul Karim, Quoc-Tuan Vien * , Tuan Anh Le and Glenford Mapp

Fuente: http://mdpi.com/



DESCARGAR PDF




Documentos relacionados