• DocumentCode
    678214
  • Title

    Experimental evaluation of Snort against DDoS attacks under different hardware configurations

  • Author

    Saboor, Amtul ; Akhlaq, Monis ; Aslam, Baber

  • Author_Institution
    Nat. Univ. of Sci. & Technol., Islamabad, Pakistan
  • fYear
    2013
  • fDate
    11-12 Dec. 2013
  • Firstpage
    31
  • Lastpage
    37
  • Abstract
    Network intrusion detection systems are considered as one of the basic entities widely utilized and studied in the field of network security that aim to detect any hostile intrusion within a given network. Among many network intrusion detection systems (NIDS), open source systems have gained substantial preference due to their flexibility, support and cost effectiveness. Snort, an open source system is considered as the de-facto standard for NIDS. In this paper, effort has been made to gauge Snort in terms of performance (packet handling) and detection accuracy against TCP Flooding Distributed Denial of Service attack. The evaluation has been done using a sophisticated test-bench under different hardware configurations. This paper has analyzed the major factors affecting the performance and detection capability of Snort and has recommended techniques to make Snort a better intrusion detection system (IDS). Experimental results have shown significant improvement in Snort packet handling capability by using better hardware. However; Snort detection capability is not improved by improving hardware and is dependent upon its internal architecture (signature database and rate filtration). Furthermore, the findings can be applied to other signature based intrusion detection systems for refining their performance and detection capability.
  • Keywords
    computer network security; public domain software; transport protocols; DDoS attacks; NIDS; Snort detection capability; Snort packet handling capability; TCP flooding distributed denial of service attack; detection accuracy; hardware configurations; internal architecture; network intrusion detection systems; network security; open source systems; rate filtration; signature database; Availability; Computer crime; Floods; Hardware; Intrusion detection; Measurement; Servers; Distributes Denial of Service; Network Intrusion Detection System; Network Security; Penetration Testing; Snort; Vulnerability Assessment and Defense;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Assurance (NCIA), 2013 2nd National Conference on
  • Conference_Location
    Rawalpindi
  • Print_ISBN
    978-1-4799-1287-2
  • Type

    conf

  • DOI
    10.1109/NCIA.2013.6725321
  • Filename
    6725321