Diverse layers of defence play an important role in the design of defence-in-depth architectures. The use of Intrusion Detection Systems (IDSs) are ubiquitous in this design. But the selection of the "right" IDSs in various configurations is an important decision that the security architects need to make. Additionally, the ability of these IDSs to adapt to the evolving threat-landscape also needs to be investigated. To help with these decisions, we need rigorous quantitative analysis. In this paper, we present a diversity analysis of open-source IDSs, Snort and Suricata, to help security architects tune/deploy these IDSs. We analyse two types of diversities in these IDSs; configurational diversity and functional diversity. In the configurat...
Current firewalls and intrusion detection systems are generally designed to protect a single gateway...
Many organizations and businesses are all delving into crafting out an online presence for themselve...
Network intrusions have been active topic for researches for many years. However, in order to gain i...
We present an analysis of the diversity that exists in the rules and blacklisted IP addresses of the...
Defence-in-depth is a term often used in security literature to denote architectures in which multip...
Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and n...
Network-based Intrusion Detection Systems (NIDSs) are an important mechanism to identify malicious b...
In the present world, with increasing Internet availability, there is a constant threat about data, ...
Intrusion Detection Systems (IDS) are used to notice network anomalies and preserve the protection o...
Statistical analysis of network intrusions has been an active topic for researches for many years. H...
This report presents the analysis of the detection capabilities of intrusion detection systems when ...
The security gains of intrusion-tolerant systems are directly dependent on the assumption that syste...
Intrusion detection systems are used to monitor information systems, creating large number of alerts...
Contemporary organizations often employ signature-based network intrusion detection systems to incre...
With the world moving towards being increasingly dependent on computers and automation, one of the m...
Current firewalls and intrusion detection systems are generally designed to protect a single gateway...
Many organizations and businesses are all delving into crafting out an online presence for themselve...
Network intrusions have been active topic for researches for many years. However, in order to gain i...
We present an analysis of the diversity that exists in the rules and blacklisted IP addresses of the...
Defence-in-depth is a term often used in security literature to denote architectures in which multip...
Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and n...
Network-based Intrusion Detection Systems (NIDSs) are an important mechanism to identify malicious b...
In the present world, with increasing Internet availability, there is a constant threat about data, ...
Intrusion Detection Systems (IDS) are used to notice network anomalies and preserve the protection o...
Statistical analysis of network intrusions has been an active topic for researches for many years. H...
This report presents the analysis of the detection capabilities of intrusion detection systems when ...
The security gains of intrusion-tolerant systems are directly dependent on the assumption that syste...
Intrusion detection systems are used to monitor information systems, creating large number of alerts...
Contemporary organizations often employ signature-based network intrusion detection systems to incre...
With the world moving towards being increasingly dependent on computers and automation, one of the m...
Current firewalls and intrusion detection systems are generally designed to protect a single gateway...
Many organizations and businesses are all delving into crafting out an online presence for themselve...
Network intrusions have been active topic for researches for many years. However, in order to gain i...