Skip to main content
Erschienen in: Wireless Personal Communications 2/2017

13.02.2016

Performance Comparison and Detection Analysis in Snort and Suricata Environment

Erschienen in: Wireless Personal Communications | Ausgabe 2/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, crimes are cause in the internet by hacking to target one’s and the companies financial. Due to the massive crimes that are caused by digital convergence and ubiquitous IT system, it is clear that the amount of network packet which need to be processed are rising. The digital convergence and ubiquitous IT system caused the IDS (Intrusion Detection System) to process packets more than the past. Snort (version 2.x) is a leading open source IDS which has a long history but since it was built a long time ago, it has several limitations which are not fit for today’s requirements. Such as, it’s processing unit is in single threading. On the other hand, Suricara was built to cover Snorts these disadvantages. To cover massive amount of packets which are caused by digital convergence and ubiquitous IT system Suricata’s have the availability to process packets in multi-threading environment. In this paper we have analyzed and compared Snort and Suricata’s processing and detection rate to decide which is better in single threading or multi-threading environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Roesch, M. (1999). Snort: Lightweight intrusion detection for networks. vol. 229. Santa Clara, CA: Stanford Telecommunications Inc. Roesch, M. (1999). Snort: Lightweight intrusion detection for networks. vol. 229. Santa Clara, CA: Stanford Telecommunications Inc.
2.
Zurück zum Zitat Zhou, Z., Zhongwen, C., & Tiecheng, Z. (2010). The study on network intrusion detection system of Snort. In 2010 2nd International Conference, IEEE. Zhou, Z., Zhongwen, C., & Tiecheng, Z. (2010). The study on network intrusion detection system of Snort. In 2010 2nd International Conference, IEEE.
3.
Zurück zum Zitat Tjhai, G. C., Papadaki, M., Furnell, S. M., & Clarke, N. L. Investigating the problem of IDS false alarms: An experimental study using Snort. In International Information Security Conference. Tjhai, G. C., Papadaki, M., Furnell, S. M., & Clarke, N. L. Investigating the problem of IDS false alarms: An experimental study using Snort. In International Information Security Conference.
4.
Zurück zum Zitat DeLong, R. J., & Los Gatos, C. A. (2001). Structured exception-handling methods, apparatus, and computer program products. Sun Microsystems Inc. DeLong, R. J., & Los Gatos, C. A. (2001). Structured exception-handling methods, apparatus, and computer program products. Sun Microsystems Inc.
5.
Zurück zum Zitat Chakrabarti S., Chakraborty, M., & Mukhopadhyay, I. Study of snort-based IDS ICWET 10. In Proceedings of the International Conference and Workshop on Emerging Trends in Technology, pp. 43–47. Chakrabarti S., Chakraborty, M., & Mukhopadhyay, I. Study of snort-based IDS ICWET 10. In Proceedings of the International Conference and Workshop on Emerging Trends in Technology, pp. 43–47.
6.
Zurück zum Zitat Norton, M., & Roelker, D. (2002). SNORT 2.0: Hi-performance multi-rule inspection engine. Columbia: Sourcefire Network Security Inc. Norton, M., & Roelker, D. (2002). SNORT 2.0: Hi-performance multi-rule inspection engine. Columbia: Sourcefire Network Security Inc.
7.
Zurück zum Zitat Day, D. & Burns, B. (2011). A performance analysis of Snort and Suricata network intrusion detection and prevention engines. In Fifth International Conference on Digital Society, Gosier, Guadeloupe, pp. 187–192. Day, D. & Burns, B. (2011). A performance analysis of Snort and Suricata network intrusion detection and prevention engines. In Fifth International Conference on Digital Society, Gosier, Guadeloupe, pp. 187–192.
8.
Zurück zum Zitat Garcia-Teodoro, P., et al. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28(1), 18–28.CrossRef Garcia-Teodoro, P., et al. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28(1), 18–28.CrossRef
9.
Zurück zum Zitat Caswell, B., Beale, J., & Baker, A. (2007). Snort IDS and IPS toolkit. New York: Syngress. Caswell, B., Beale, J., & Baker, A. (2007). Snort IDS and IPS toolkit. New York: Syngress.
11.
Zurück zum Zitat Watchinski, M. (2011). Unusual snort performance stats. Retrieved October 2 2011 from comments.gmane.org/gmane.comp.security.ids.snort.general/30527. Watchinski, M. (2011). Unusual snort performance stats. Retrieved October 2 2011 from comments.gmane.org/gmane.comp.security.ids.snort.general/30527.
12.
Zurück zum Zitat Burks, D. (2014). Security onion: Peel back the layers of your network in minutes. Pittsburgh, PA: Software Engineering Institute. Burks, D. (2014). Security onion: Peel back the layers of your network in minutes. Pittsburgh, PA: Software Engineering Institute.
13.
Zurück zum Zitat Deuble, A. (2012). Detecting and preventing web application attacks with security onion. SANS Institute, 4(1), 26–33. Deuble, A. (2012). Detecting and preventing web application attacks with security onion. SANS Institute, 4(1), 26–33.
14.
Zurück zum Zitat Bejtlich, R. (2013). The practice of network security monitoring: understanding incident detection and response. San Francisco: No Starch Press. Bejtlich, R. (2013). The practice of network security monitoring: understanding incident detection and response. San Francisco: No Starch Press.
Metadaten
Titel
Performance Comparison and Detection Analysis in Snort and Suricata Environment
Publikationsdatum
13.02.2016
Erschienen in
Wireless Personal Communications / Ausgabe 2/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3209-9

Weitere Artikel der Ausgabe 2/2017

Wireless Personal Communications 2/2017 Zur Ausgabe

Neuer Inhalt