Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

Intrusion Detection Prevention System using SNORT

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2018
Authors:
Aaliya Tasneem, Abhishek Kumar, Shabnam Sharma
10.5120/ijca2018918280

Aaliya Tasneem, Abhishek Kumar and Shabnam Sharma. Intrusion Detection Prevention System using SNORT. International Journal of Computer Applications 181(32):21-24, December 2018. BibTeX

@article{10.5120/ijca2018918280,
	author = {Aaliya Tasneem and Abhishek Kumar and Shabnam Sharma},
	title = {Intrusion Detection Prevention System using SNORT},
	journal = {International Journal of Computer Applications},
	issue_date = {December 2018},
	volume = {181},
	number = {32},
	month = {Dec},
	year = {2018},
	issn = {0975-8887},
	pages = {21-24},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume181/number32/30195-2018918280},
	doi = {10.5120/ijca2018918280},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Living in the age of information, each and every action result in some form of data creation. According to statistics, over 300 thousand tweets and over 4 million Facebook posts are being generated per minute. Knowing the fact that more users and more data require more security. In the modern era, security and reliability have become the major concerns for an individual or an organization. In this paper, various terminologies, techniques and methodologies related to Intrusion Detection and Prevention System (IDPS) have been discussed. This paper provides different approaches on implementation of IDPS that is based on in-depth study of various research endeavors. It majorly deals with the concept of Intrusion Detection System using Snort which is a popular tool for network security. It is widely accepted by corporate sectors in order to secure their organization’s network. The paper gives a fair knowledge of Snort, about its purpose, the modes it associated with, its implementations and the applications. Review has been made on the basis of the studies and research done in the literature section.

References

  1. Chi, R. (2014, January). Intrusion detection system based on snort. In Proceedings of the 9th International Symposium on Linear Drives for Industry Applications, Volume 3 (pp. 657-664). Springer Berlin Heidelberg.
  2. Peng, Y. (2012, May). Research of network intrusion detection system based on snort and NTOP. In Fuzzy Systems and Knowledge Discovery (FSKD), 2012 9th International Conference on (pp. 2764-2768). IEEE.
  3. Zhou, Z., Zhongwen, C., Tiecheng, Z., & Xiaohui, G. (2010, May). The study on network intrusion detection system of Snort. In Networking and Digital Society (ICNDS), 2010 2nd International Conference on (Vol. 2, pp. 194-196). IEEE.
  4. Kenkre, P. S., Pai, A., & Colaco, L. (2015). Real time intrusion detection and prevention system. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 405-411). Springer, Cham.
  5. Gaddam, R., & Nandhini, M. (2017, March). An analysis of various snort based techniques to detect and prevent intrusions in networks proposal with code refactoring snort tool in Kali Linux environment. In Inventive Communication and Computational Technologies (ICICCT), 2017 International Conference on (pp. 10-15). IEEE.
  6. Kai, Z. (2012, March). Research and design of the distributed intrusion detection system based on Snort. In 2012 International Conference on Computer Science and Electronics Engineering (pp. 525-527). IEEE.
  7. Mohamed, A. B., Idris, N. B., & Shanmugum, B. (2012). A brief introduction to intrusion detection system. In Trends in Intelligent Robotics, Automation, and Manufacturing (pp. 263-271). Springer, Berlin, Heidelberg.
  8. Bashir, U., & Chachoo, M. (2014, March). Intrusion detection and prevention system: Challenges & opportunities. In Computing for Sustainable Global Development (INDIACom), 2014 International Conference on (pp. 806-809). IEEE.
  9. Kumar, G., Kumar, K., & Sachdeva, M. (2010). The use of artificial intelligence based techniques for intrusion detection: a review. Artificial Intelligence Review, 34(4), 369-387.
  10. Khamphakdee, N., Benjamas, N., & Saiyod, S. (2014, May). Improving intrusion detection system based on snort rules for network probe attack detection. In Information and Communication Technology (ICoICT), 2014 2nd International Conference on (pp. 69-74). IEEE.
  11. Zhai, J., & Xie, Y. (2011, August). Researh on Network Intrusion Prevention System Based on Snort. In Strategic Technology (IFOST), 2011 6th International Forum on (Vol. 2, pp. 1133-1136). IEEE
  12. Boughrara, A., & Mammar, S. (2012, March). Implementation of a SNORT's output Plug-In in reaction to ARP Spoofing's attack. In Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 2012 6th International Conference on (pp. 643-647). IEEE
  13. Garg, A., & Maheshwari, P. (2016, January). Performance Analysis of Snort-based Intrusion Detection System. In Advanced Computing and Communication Systems (ICACCS), 2016 3rd International Conference on (Vol. 1, pp. 1-5). IEEE.
  14. Upadhyay, U., & Khilari, G. (2016, May). SQL injection avoidance for protected database with ASCII using SNORT and HONEYPOT. In Advanced Communication Control and Computing Technologies (ICACCCT), 2016 International Conference on (pp. 596-599). IEEE
  15. Patel, S. K., & Sonker, A. (2016, December). Internet Protocol Identification Number Based Ideal Stealth Port Scan Detection Using Snort. In Computational Intelligence and Communication Networks (CICN), 2016 8th International Conference on (pp. 422-427). IEEE

Keywords

Intrusion Detection System; Intrusion Prevention System; Snort