Title :
Experimental evaluation of Snort against DDoS attacks under different hardware configurations
Author :
Saboor, Amtul ; Akhlaq, Monis ; Aslam, Baber
Author_Institution :
Nat. Univ. of Sci. & Technol., Islamabad, Pakistan
Abstract :
Network intrusion detection systems are considered as one of the basic entities widely utilized and studied in the field of network security that aim to detect any hostile intrusion within a given network. Among many network intrusion detection systems (NIDS), open source systems have gained substantial preference due to their flexibility, support and cost effectiveness. Snort, an open source system is considered as the de-facto standard for NIDS. In this paper, effort has been made to gauge Snort in terms of performance (packet handling) and detection accuracy against TCP Flooding Distributed Denial of Service attack. The evaluation has been done using a sophisticated test-bench under different hardware configurations. This paper has analyzed the major factors affecting the performance and detection capability of Snort and has recommended techniques to make Snort a better intrusion detection system (IDS). Experimental results have shown significant improvement in Snort packet handling capability by using better hardware. However; Snort detection capability is not improved by improving hardware and is dependent upon its internal architecture (signature database and rate filtration). Furthermore, the findings can be applied to other signature based intrusion detection systems for refining their performance and detection capability.
Keywords :
computer network security; public domain software; transport protocols; DDoS attacks; NIDS; Snort detection capability; Snort packet handling capability; TCP flooding distributed denial of service attack; detection accuracy; hardware configurations; internal architecture; network intrusion detection systems; network security; open source systems; rate filtration; signature database; Availability; Computer crime; Floods; Hardware; Intrusion detection; Measurement; Servers; Distributes Denial of Service; Network Intrusion Detection System; Network Security; Penetration Testing; Snort; Vulnerability Assessment and Defense;
Conference_Titel :
Information Assurance (NCIA), 2013 2nd National Conference on
Conference_Location :
Rawalpindi
Print_ISBN :
978-1-4799-1287-2
DOI :
10.1109/NCIA.2013.6725321