SURVEY ON SIGNATURE BASED INTRUCTION DETECTION SYSTEM USING MULTITHREADING
DOI:
https://doi.org/10.29121/granthaalayah.v5.i4RACSIT.2017.3352Keywords:
Intrusion Detection, Signature, Multi-ThreadingAbstract [English]
The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. Many intrusion detection techniques have been developed on fixed wired networks but have been turned to be inapplicable in this new environment. We need to search for new architecture and mechanisms to protect computer networks. Signature-based Intrusion Detection System matches network packets against a pre-configured set of intrusion signatures. Current implementations of IDS employ only a single thread of execution and as a consequence benefit very little from multi-processor hardware platforms. A multi-threaded technique would allow more efficient and scalable exploitation of these multi-processor machines.
Downloads
References
Lin Gao. “MULTITHREADING”, cs9244 report, 2006.
Geschke, D.: Fast logging project for snort.http://www.geschke-online.de/FLoP/ (2004)
Abbas, S.Y.: Introducing multi threaded solution to enhance the efficiency of snort. Master’s thesis, Florida State University (2002)
FabricioSergie de Paula, Leandro Nunes de Castro,and Paulo LIcio de Geus, “A Intrusion Detection System Using Ideas from the Immune System ”, IEEE 2004.
Francisco Macia -Perez, Francisco J. Mora-Gimeno, Diego Marcos-Jorquera, Juan Antonio Gil-Martinez-Abarca, Hector Ramos-Morillo and Iren Lorenzo-Fonseca, “Network Intrusion Detection System Embedded on a Smart Sensor”, Transactions on industrial Electronics IEEE, Vol.58, No.3, March-2011. DOI: https://doi.org/10.1109/TIE.2010.2052533
Vinod Kumar and Dr. Om Prakash Sangwan,“Signature based intrusion detection system usingSNORT”, International Journal of computerapplication & information technology, 2012.
Downloads
Published
How to Cite
Issue
Section
License
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.