DocumentCode
678214
Title
Experimental evaluation of Snort against DDoS attacks under different hardware configurations
Author
Saboor, Amtul ; Akhlaq, Monis ; Aslam, Baber
Author_Institution
Nat. Univ. of Sci. & Technol., Islamabad, Pakistan
fYear
2013
fDate
11-12 Dec. 2013
Firstpage
31
Lastpage
37
Abstract
Network intrusion detection systems are considered as one of the basic entities widely utilized and studied in the field of network security that aim to detect any hostile intrusion within a given network. Among many network intrusion detection systems (NIDS), open source systems have gained substantial preference due to their flexibility, support and cost effectiveness. Snort, an open source system is considered as the de-facto standard for NIDS. In this paper, effort has been made to gauge Snort in terms of performance (packet handling) and detection accuracy against TCP Flooding Distributed Denial of Service attack. The evaluation has been done using a sophisticated test-bench under different hardware configurations. This paper has analyzed the major factors affecting the performance and detection capability of Snort and has recommended techniques to make Snort a better intrusion detection system (IDS). Experimental results have shown significant improvement in Snort packet handling capability by using better hardware. However; Snort detection capability is not improved by improving hardware and is dependent upon its internal architecture (signature database and rate filtration). Furthermore, the findings can be applied to other signature based intrusion detection systems for refining their performance and detection capability.
Keywords
computer network security; public domain software; transport protocols; DDoS attacks; NIDS; Snort detection capability; Snort packet handling capability; TCP flooding distributed denial of service attack; detection accuracy; hardware configurations; internal architecture; network intrusion detection systems; network security; open source systems; rate filtration; signature database; Availability; Computer crime; Floods; Hardware; Intrusion detection; Measurement; Servers; Distributes Denial of Service; Network Intrusion Detection System; Network Security; Penetration Testing; Snort; Vulnerability Assessment and Defense;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Assurance (NCIA), 2013 2nd National Conference on
Conference_Location
Rawalpindi
Print_ISBN
978-1-4799-1287-2
Type
conf
DOI
10.1109/NCIA.2013.6725321
Filename
6725321
Link To Document