Defending Against Bruteforc Attack Using Open Source - SNORT

被引:0
|
作者
Bharati, Manisha [1 ]
Tamane, Sharvaree [2 ]
机构
[1] Indira Coll Engn & Management, Dept Comp, Pune, Maharashtra, India
[2] Jawaharlal Nehru Engn Coll, IT Dept, Aurangabad, Maharashtra, India
关键词
Intrusion detection; Attacks; Malicious Insider; Security; Brute force Attack; SNORT; IDS; IPS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the fast development of the network, network information measure has been greatly improved. In high-speed network surroundings, higher demand is required to the Intrusion Prevention System (IPS) and intrusion detection system (IDS). Snort could be a well-known open supply Intrusion Detection System as well as Intrusion Prevention System that may be used as a second line of defense in a very network to observe any incoming attacks from any source and alert the network administrator regarding this attack This analysis can check Snort's sturdiness against Brute Force attack.
引用
收藏
页码:903 / 907
页数:5
相关论文
共 50 条
  • [41] Analyzing and Defending <monospace>GhostTouch</monospace> Attack Against Capacitive Touchscreens
    Wang, Kai
    Mitev, Richard
    Yan, Chen
    Ji, Xiaoyu
    Sadeghi, Ahmad-Reza
    Xu, Wenyuan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4360 - 4375
  • [42] Defending against packet dropping attack in vehicular ad hoc networks
    Djahel, Soufiene
    Nait-Abdesselam, Farid
    Zhang, Zonghua
    Khokhar, Ashfaq
    SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (03) : 245 - 258
  • [43] Spectrum sensing defending against PUE attack based on fractal dimension
    Fu, Shuang
    Zhang, Guoyin
    Li Yang
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : S2667 - S2675
  • [44] LFighter: Defending against the label-flipping attack in federated learning
    Jebreel, Najeeb Moharram
    Domingo-Ferrer, Josep
    Sanchez, David
    Blanco-Justicia, Alberto
    NEURAL NETWORKS, 2024, 170 : 111 - 126
  • [45] Detection of Cloned Recognizers: A Defending Method against Recognizer Cloning Attack
    Mori, Yuto
    Nakamura, Kazuaki
    Nitta, Naoko
    Babaguchi, Noboru
    2020 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2020, : 1375 - 1380
  • [46] Spectrum sensing defending against PUE attack based on fractal dimension
    Shuang Fu
    Guoyin Zhang
    Li Yang
    Cluster Computing, 2019, 22 : 2667 - 2675
  • [47] SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN
    Liu, Xinyu
    Cho, Beumjin
    Kim, Jong
    INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 29 - 41
  • [48] WIRELESS INTRUSION DETECTION FOR DEFENDING AGAINST TCP SYN FLOODING ATTACK AND MAN-IN-THE-MIDDLE ATTACK
    Tang, Huan-Rong
    Sun, Rou-Ling
    Kong, Wei-Qiang
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 1464 - 1470
  • [49] Defending against Packet-In messages flooding attack under SDN context
    Gao, Deyun
    Liu, Zehui
    Liu, Ying
    Foh, Chuan Heng
    Zhi, Ting
    Chao, Han-Chieh
    SOFT COMPUTING, 2018, 22 (20) : 6797 - 6809
  • [50] CardioDefense: Defending against adversarial attack in ECG classification with adversarial distillation training
    Shao, Jiahao
    Geng, Shijia
    Fu, Zhaoji
    Xu, Weilun
    Liu, Tong
    Hong, Shenda
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2024, 91