On high-speed flow-based intrusion detection using snort-compatible signatures

F Erlacher, F Dressler - IEEE Transactions on Dependable and …, 2020 - ieeexplore.ieee.org
Signature-based Network Intrusion Detection Systems (NIDS) have become state-of-the-art
in modern network security solutions. However, most systems are not designed for modern …

Performance enhancement of snort ids through kernel modification

SA Changazi, I Shafi, K Saleh, MH Islam… - … on Information and …, 2019 - ieeexplore.ieee.org
Performance and improved packet handling capacity against high traffic load are important
requirements for an effective intrusion detection system (IDS). Snort is one of the most …

An extremely lightweight approach for ddos detection at home gateways

G Mendonça, GHA Santos, ES e Silva… - … Conference on Big …, 2019 - ieeexplore.ieee.org
A major threat to the Internet infrastructure and, more broadly, to its culture is posed by
DDoS attacks. To mitigate their impact, detection should preferably occur close to the attack …

Challenges of Digital Investigations in Nowadays Communication Networks

D Spiekermann, J Keller - 2024 IEEE International Conference …, 2024 - ieeexplore.ieee.org
As a branch of digital investigation network foren-sics is faced with different arising
challenges due to the evolution of modern networks. These networks are getting faster, more …

Encapcap: Transforming network traces to virtual networks

D Spiekermann, J Keller - 2021 IEEE 7th International …, 2021 - ieeexplore.ieee.org
Valid and complete network captures are a valuable source when detecting network based
attacks and adversarial data exfiltration techniques like covert channels or performing …

A model-based approach to anomaly detection trading detection time and false alarm rate

CF Gonçalves, DS Menasché, A Avritzer… - 2020 Mediterranean …, 2020 - ieeexplore.ieee.org
The complexity and ubiquity of modern computing systems is a fertile ground for anomalies,
including security and privacy breaches. In this paper, we propose a new methodology that …

A comparative study of traffic generators: Applicability for malware detection testbeds

M Swann, J Rose, G Bendiab… - Journal of Internet …, 2021 - researchportal.port.ac.uk
Network traffic generators are invaluable tools that allow for applied experimentation to
evaluate the performance of networks, infrastructure, and security controls, by modelling and …

[HTML][HTML] Estimating the Memory Consumption of a Hardware IP Defragmentation Block

M Czekaj, E Jamro, K Wiatr - Electronics, 2021 - mdpi.com
IP fragmentation is still prevalent on the Internet. Defragmented traffic is a prerequisite for
many network processing algorithms. This work focuses on the size and organization of a …

A study of applied passive TLS analysis

AS Torbjørnsen - 2018 - ntnuopen.ntnu.no
While the Internet is moving towards more and more encryption of the network traffic, it is
also a trend that is picked up by authors of malware. The traditional way of detecting …

Анализ защищенности облачной инфраструктуры OpenStack при эмуляции атаки вида DDOS на узлах инфраструктуры

РВ Алехин, ИЕ Пестов, ДН Смирнов… - … в науке и …, 2023 - elibrary.ru
На сегодняшний день использование облачных технологий становится одним из
самых популярных решений. Независимо от модели развертывания облачной …