Defending Against Bruteforc Attack Using Open Source - SNORT

被引:0
|
作者
Bharati, Manisha [1 ]
Tamane, Sharvaree [2 ]
机构
[1] Indira Coll Engn & Management, Dept Comp, Pune, Maharashtra, India
[2] Jawaharlal Nehru Engn Coll, IT Dept, Aurangabad, Maharashtra, India
关键词
Intrusion detection; Attacks; Malicious Insider; Security; Brute force Attack; SNORT; IDS; IPS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the fast development of the network, network information measure has been greatly improved. In high-speed network surroundings, higher demand is required to the Intrusion Prevention System (IPS) and intrusion detection system (IDS). Snort could be a well-known open supply Intrusion Detection System as well as Intrusion Prevention System that may be used as a second line of defense in a very network to observe any incoming attacks from any source and alert the network administrator regarding this attack This analysis can check Snort's sturdiness against Brute Force attack.
引用
收藏
页码:903 / 907
页数:5
相关论文
共 50 条
  • [1] Defending Against Wormhole Attack in MANET
    Patel, Anal
    Patel, Nimisha
    Patel, Rajan
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 674 - 678
  • [2] AN APPROACH OF DEFENDING AGAINST DDOS ATTACK
    Wu Zhijun Duan Haixin Li Xing (Network Research Center
    Journal of Electronics(China), 2006, (01) : 148 - 153
  • [3] Defending Against Wormhole Attack in OLSR
    HONG Liang HONG Fan FU Cai
    Geo-Spatial Information Science, 2006, (03) : 229 - 233
  • [4] Defending Against Wormhole Attack in OLSR
    Hong Liang
    Hong Fan
    Fu Cai
    GEO-SPATIAL INFORMATION SCIENCE, 2006, 9 (03) : 229 - 233
  • [5] AN APPROACH OF DEFENDING AGAINST DDOS ATTACK
    Wu Zhijun Duan Haixin Li Xing Network Research Center Tsinghua University Beijing China Tianjin Key Lab for Advanced Signal Processing Civil Aviation University of China Tianjin China
    JournalofElectronics, 2006, (01) : 148 - 153
  • [6] Defending against the Pirate Evolution Attack
    Jin, Hongxia
    Lotspiech, Jeffrey
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 147 - 158
  • [7] Defending electronic systems against hardware attack
    Jimenez Naharro, Raul
    Gomez Bravo, Fernando
    Gomez Galan, Juan Antonio
    Sanchez Raya, Manuel
    Mata de Acuna, Juan Jose
    PROCEEDINGS OF 2016 TECHNOLOGIES APPLIED TO ELECTRONICS TEACHING (TAEE 2016), 2016,
  • [8] Defending Against the Attack of the Micro-clones
    van Tonder, Rijnard
    Le Goues, Claire
    2016 IEEE 24TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC), 2016,
  • [9] Which open-source IDS? Snort, Suricata or Zeek
    Waleed, Abdul
    Jamali, Abdul Fareed
    Masood, Ammar
    COMPUTER NETWORKS, 2022, 213
  • [10] Defending against biological attack: Importance of biotechnology in preparedness
    Pearson, GS
    Roberts, B
    DEFENCE SCIENCE JOURNAL, 2001, 51 (04) : 377 - 392