Performance Evaluation of an Intrusion Detection System

被引:1
|
作者
Saber, Mohammed [1 ]
Chadli, Sara [2 ]
Emharraf, Mohamed [1 ]
El Farissi, Ilhame [1 ]
机构
[1] First Mohammed Univ, Natl Sch Appl Sci, Lab LSE2I, Oujda, Morocco
[2] First Mohammed Univ, Fac Sci, Lab Elect & Syst, Oujda, Morocco
关键词
Evaluation; Intrusion detection system (IDS); Network security; Performance; Embedded system; Field-Programmable Gate Array (FPGA); SNORT; Traffic generator;
D O I
10.1007/978-3-319-30298-0_52
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks take place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. Research in intrusion detection systems aims to reduce the impact of these attacks. In the recent years, research in intrusion detection systems aims to reduce the impact of attacks, and to evaluate the system. The evaluation of an IDS is a difficult task. We can make the difference between evaluating the effectiveness of an entire system and characteristics of the system components. In this sheet of paper, we present an approach for IDS evaluating based on measurement of its components performance. In this context, we have proposed a hardware platform based on embedded systems for the implementation of an IDS (SNORT) components. After, we tested a system for generating traffics and attacks based on Linux KALI (Backtrack) and Metasploite 3 Framework. The obtained results show the IDS performance is linked to the characteristics of these components. The obtained results show that the performance characteristics of an IDS depends on the performance of its components.
引用
收藏
页码:509 / 517
页数:9
相关论文
共 50 条
  • [1] Performance Evaluation of Different Intrusion Detection System: An Empirical Approach
    Beigh, Bilal Maqbool
    Peer, M. A.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [2] Feature Engineering Methods in Intrusion Detection System: A Performance Evaluation
    Zare, F.
    Mahmoudi-Nasr, P.
    INTERNATIONAL JOURNAL OF ENGINEERING, 2023, 36 (07): : 1343 - 1353
  • [3] A New Metric for Proficient Performance Evaluation of Intrusion Detection System
    Aggarwal, Preeti
    Sharma, Sudhir Kumar
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 321 - 331
  • [4] Implementation and performance evaluation of high-performance intrusion detection and response system
    Kim, HJ
    Kim, BK
    Kim, IK
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 998 - 1006
  • [5] Performance Evaluation of a Novel Intrusion Detection System in Next Generation Networks
    Sood, Keshav
    Dinh Duc Nha Nguyen
    Nosouhi, Mohammad Reza
    Kumar, Neeraj
    Jiang, Frank
    Chowdhury, Morshed
    Doss, Robin
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (03): : 3831 - 3847
  • [6] Architecture and performance evaluation of a hybrid intrusion detection system for IP telephony
    Barry, Bazara I. A.
    Chan, H. Anthony
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1539 - 1555
  • [7] Design and realization of evaluation environment in the performance analysis of intrusion detection system
    Guiping, Liao
    Fei, Yu
    Yue, Shen
    Linfeng, Zhang
    Cheng, Xu
    PROCEEDINGS OF THE 26TH CHINESE CONTROL CONFERENCE, VOL 6, 2007, : 303 - +
  • [8] An Evaluation of Intrusion Detection System on Jubatus
    Ogino, Tadashi
    PROGRESS IN SYSTEMS ENGINEERING, 2015, 366 : 359 - 364
  • [9] Performance Evaluation of Rough Set Based Classification Models to Intrusion Detection System
    Suyal, Priyanka
    Pant, Janmejay
    Dwivedi, Akhilesh
    Lohani, Manoj Chandra
    2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION, & AUTOMATION (ICACCA) (FALL), 2016, : 209 - 214
  • [10] Performance evaluation of learning models for intrusion detection system using feature selection
    Kaushik, Baijnath
    Sharma, Reya
    Dhama, Kulwant
    Chadha, Akshma
    Sharma, Surbhi
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (04) : 529 - 548