Elektrotechnika
36 (1/2017), DOI: 10.7862/re.2017.5
The analysis of efficiency and performance of intrusion prevention systems
Mariusz Szarek, Mariusz Nycz, Sara Nienajadło
DOI: 10.7862/re.2017.5
Abstract
This article aims at presenting a comparative analysis of two intrusion detection and prevention systems, namely Snort and Suricata, run in the af-packet mode in the context of the efficiency of their protection against the denial of service attacks. The paper sets out, in statistical terms, the denial of service attacks and distributed denial-of-service attacks occurring around the world. In the further part of the research, penetration tests were conducted in order to assess comparatively analysis of the efficiency of IDS/IPS systems was carried out in the context of starting various numbers of network connected devices as well as in the case of sending packets with different sizes. This article is addressed to security systems administrators as well as to people involved in security systems implementation.
References
[1] https://dataspace.pl/dos-rodzaje-atakow-cz-1/[Access: 24.08.2015]
[2] https://dataspace.pl/dos-rodzaje-atakow-cz-2/[Access: 3.09.2015]
[3] https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/q1-2017-state-of-the-internet-security-executive-summary.pdf [Access: 19.05.2017]
[4] K. Scarfone, P. Mell: Guide to Intrusion Detection and Prevention Systems (IDPS)
[5] http://students.mimuw.edu.pl/SO/Projekt04-05/temat5-g2/sikora-kobylinski/idsips.html [Access: 23.12.2015]
[6] http://sekurak.pl/wprowadzenie-do-systemow-ids/[Access: 23.03.2015]
[7] http://insecure.org/sploits/land.ip.DOS.html[Access: 20.11.1997]
[8] http://www.computerworld.pl/news/291980/Atak.na.sieci.IP.html [Access: 29.12.1997]
[9] https://www.incapsula.com/ddos/attack-glossary/http-flood.html [Access: 18.10.2015]
[10] https://www.incapsula.com/ddos/attack-glossary/syn-flood.html [Access: 18.10.2015]
[11] https://www.debian.org/doc/ [Access: 7.04.2015]
[12] https://www.snort.org/documents/snort-ips-tutorial [Access: 25.08.2015]
[13] https//www.snort.org/documents [Access: 25.08.2015]
[14] https://www.kali.org/kali-linux-documentation/ [Access: 2.01.2016]
[15] http://wiki.hping.org [Access: 30.09.2009]
[16] http://suricata-ids.org/docs/ [Access: 6.08.2014]
[17] Ch. Chapman: Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
About this Article
TITLE:
The analysis of efficiency and performance of intrusion prevention systems
AUTHORS:
Mariusz Szarek (1)
Mariusz Nycz (2)
Sara Nienajadło (3)
AUTHORS AFFILIATIONS:
(1) Politechnika Rzeszowska, Zakład Systemów Złożonych
(2) Politechnika Rzeszowska, Zakład Systemów Złożonych
(3) Politechnika Rzeszowska, Zakład Systemów Złożonych
JOURNAL:
Elektrotechnika
36 (1/2017)
KEY WORDS AND PHRASES:
security, network, test, protection, detection, service, denial, intrusion, system, DDoS, DoS, attack
FULL TEXT:
http://doi.prz.edu.pl/pl/pdf/elektrotechnika/87
DOI:
10.7862/re.2017.5
URL:
http://dx.doi.org/10.7862/re.2017.5
RECEIVED:
2017-05-15
COPYRIGHT:
Publishing House of Rzeszow University of Technology Powstańców Warszawy 12, 35-959 Rzeszow