Defending Against Bruteforc Attack Using Open Source - SNORT

被引:0
|
作者
Bharati, Manisha [1 ]
Tamane, Sharvaree [2 ]
机构
[1] Indira Coll Engn & Management, Dept Comp, Pune, Maharashtra, India
[2] Jawaharlal Nehru Engn Coll, IT Dept, Aurangabad, Maharashtra, India
关键词
Intrusion detection; Attacks; Malicious Insider; Security; Brute force Attack; SNORT; IDS; IPS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the fast development of the network, network information measure has been greatly improved. In high-speed network surroundings, higher demand is required to the Intrusion Prevention System (IPS) and intrusion detection system (IDS). Snort could be a well-known open supply Intrusion Detection System as well as Intrusion Prevention System that may be used as a second line of defense in a very network to observe any incoming attacks from any source and alert the network administrator regarding this attack This analysis can check Snort's sturdiness against Brute Force attack.
引用
收藏
页码:903 / 907
页数:5
相关论文
共 50 条
  • [21] A SOLUTION FOR DEFENDING AGAINST DENIAL OF SERVICE ATTACK ON WIRELESS LAN
    Nguyen, Dinh-Thuc
    Tran, Ngoc-Bao
    Nguyen-Ho, Minh-Duc
    MOBILE AND WIRELESS NETWORKS SECURITY, PROCEEDINGS, 2008, : 67 - +
  • [22] Legal Framework for Defending Transport Networks Against Terrorist Attack
    Cryer, Robert
    TRANSPORTATION SECURITY AGAINST TERRORISM, 2009, 54 : 108 - 115
  • [23] Defending Against Membership Inference Attack by Shielding Membership Signals
    Miao, Yinbin
    Yu, Yueming
    Li, Xinghua
    Guo, Yu
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 4087 - 4101
  • [24] Robust Adversarial Watermark Defending Against GAN Synthesization Attack
    Xu, Shengwang
    Qiao, Tong
    Xu, Ming
    Wang, Wei
    Zheng, Ning
    IEEE SIGNAL PROCESSING LETTERS, 2024, 31 : 351 - 355
  • [26] DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system
    Shahram Jamali
    Reza Fotohi
    The Journal of Supercomputing, 2017, 73 : 5173 - 5196
  • [27] DSLA: Defending against selective forwarding attack in wireless sensor networks using learning automaton
    Jamshidi M.
    Esnaashari M.
    Ghasemi S.
    Qader N.N.
    Meybodi M.R.
    IEIE Transactions on Smart Processing and Computing, 2020, 9 (01): : 58 - 74
  • [28] DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system
    Jamali, Shahram
    Fotohi, Reza
    JOURNAL OF SUPERCOMPUTING, 2017, 73 (12): : 5173 - 5196
  • [29] Effective Defending Against Flood Attack Using Stream-Check Method in Tolerant Network
    Kuriakose, Divya
    Daniel, D.
    2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [30] Defending Deep Neural Networks Against Backdoor Attack by Using De-Trigger Autoencoder
    Kwon, Hyun
    IEEE ACCESS, 2025, 13 : 11159 - 11169