Analysis of Modern Intrusion Detection System

被引:0
|
作者
Titorenko, Aleksey A. [1 ]
Frolov, Alexey A. [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Moscow Engn Phys Inst, Dept Comp Syst & Technol 12, Moscow, Russia
关键词
IDS; IPS; Snort; false positives;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This article observes modern methods and technologies for detecting network intrusions. The advantages and disadvantages of modern intrusion detection devices are considered. The problem of false positives of IDSs and the consequences of such actions are described. There are analyzed malefactors attacks on IDS Snort.
引用
收藏
页码:142 / 143
页数:2
相关论文
共 50 条
  • [31] State analysis based on the agreement of the Intrusion Detection System Model
    Xing, Wenjian
    Zhang, Jing
    Li, Tonglei
    ICMS2010: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION, VOL 6: MODELLING & SIMULATION INDUSTRIAL ENGINEERING & MANAGEMENT, 2010, : 177 - 180
  • [32] The Analysis of Application of Data Mining Technology in the System of Intrusion Detection
    Liu, Zhijun
    Pu, Xiaowei
    PROCEEDINGS OF 2014 2ND INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2014), VOL 28, 2014, 28 : 75 - 78
  • [33] Performance Analysis of Snort-based Intrusion Detection System
    Garg, Akash
    Maheshwari, Prachi
    2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
  • [34] An Analysis of Supervised Tree Based Classifiers for Intrusion Detection System
    Thaseen, Sumaiya
    Kumar, Ch. Aswani
    2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [35] Application Research on Retrospective Analysis System in Network Intrusion Detection
    Wu, Wei
    Cheng, Nan
    Wang, Yubin
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 624 - 627
  • [36] ATTACK PATTERN ANALYSIS FRAMEWORK FOR MULTIAGENT INTRUSION DETECTION SYSTEM
    Kolaczek, Grzegorz
    Juszczyszyn, Krzysztof
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2008, 1 (03) : 215 - 224
  • [37] AN EVOLUTIONARY GAME ANALYSIS OF THE INTERACTION WITH FIREWALL AND INTRUSION DETECTION SYSTEM
    Yin, Ying
    Xia, Zi-Chao
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 2787 - +
  • [38] Asymptotic Analysis of A Fuzzy Based Intrusion Detection System For Zigbee
    Maphatsoe, Tsitso
    Masinde, Muthoni
    2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 89 - 96
  • [39] An Intrusion Detection System Based on Polynomial Feature Correlation Analysis
    Li, Qingru
    Tan, Zhiyuan
    Jamdagni, Aruna
    Nanda, Priyadarsi
    He, Xiangjian
    Han, Wei
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 978 - 983
  • [40] PERFORMANCE ANALYSIS OF MACHINE LEARNING TECHNIQUES FOR INTRUSION DETECTION SYSTEM
    Jadhav, Abhijit D.
    Pellakuri, Vidyullatha
    2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2019,