This article aims at presenting a comparative analysis of two intrusion detection and prevention systems, namely Snort and Suricata, run in the af-packet mode in the context of the efficiency of their protection against the denial of service attacks. The paper sets out, in statistical terms, the denial of service attacks and distributed denial-of-service attacks occurring around the world. In the further part of the research, penetration tests were conducted in order to assess comparatively analysis of the efficiency of IDS/IPS systems was carried out in the context of starting various numbers of network connected devices as well as in the case of sending packets with different sizes. This article is addressed to security systems administra...
This bachelor thesis is focusing on testing the endurance of networks against DDoS attacks. The theo...
Context. The intrusion detection systems are being widely used for detecting the malicious traffic i...
Context. The intrusion detection systems are being widely used for detecting the malicious traffic i...
Tato diplomová práce se zabývá problematikou bezpečnostních systémů IDS a IPS. V teoretické části js...
Distributed Denial of Service (DDoS) attack is an internet crime that aims to consume server resourc...
Distributed Denial of Service (DDoS) attack is an internet crime that aims to consume server resourc...
This bachelor thesis in the theoretical part contains a description of the network and transport lay...
This bachelor's thesis deals with the use of the Intrusion Detection System in the protection of com...
Tato práce podává úvod do systémů pro detekci a blokování útoků na síťovou infrastrukturu. V první č...
V magistrskem delu so predstavljeni sistemi za zaznavanje in preprečevanje vdorov, njihova vloga pri...
This This bachelor's thesis focuses on the detection and mitigation of DDoS attacks (Distributed Den...
The article presents an analysis of the vulnerability of the Apache server with regard to common DDo...
Intrusion Detection Systems (IDS) are signature-based software tools that provide mechanisms for the...
Intrusion Detection Systems (IDS) are signature-based software tools that provide mechanisms for the...
Abstract — The growing fast of the computer networks require a very high security, to keep the netwo...
This bachelor thesis is focusing on testing the endurance of networks against DDoS attacks. The theo...
Context. The intrusion detection systems are being widely used for detecting the malicious traffic i...
Context. The intrusion detection systems are being widely used for detecting the malicious traffic i...
Tato diplomová práce se zabývá problematikou bezpečnostních systémů IDS a IPS. V teoretické části js...
Distributed Denial of Service (DDoS) attack is an internet crime that aims to consume server resourc...
Distributed Denial of Service (DDoS) attack is an internet crime that aims to consume server resourc...
This bachelor thesis in the theoretical part contains a description of the network and transport lay...
This bachelor's thesis deals with the use of the Intrusion Detection System in the protection of com...
Tato práce podává úvod do systémů pro detekci a blokování útoků na síťovou infrastrukturu. V první č...
V magistrskem delu so predstavljeni sistemi za zaznavanje in preprečevanje vdorov, njihova vloga pri...
This This bachelor's thesis focuses on the detection and mitigation of DDoS attacks (Distributed Den...
The article presents an analysis of the vulnerability of the Apache server with regard to common DDo...
Intrusion Detection Systems (IDS) are signature-based software tools that provide mechanisms for the...
Intrusion Detection Systems (IDS) are signature-based software tools that provide mechanisms for the...
Abstract — The growing fast of the computer networks require a very high security, to keep the netwo...
This bachelor thesis is focusing on testing the endurance of networks against DDoS attacks. The theo...
Context. The intrusion detection systems are being widely used for detecting the malicious traffic i...
Context. The intrusion detection systems are being widely used for detecting the malicious traffic i...