SUST Repository

Performance Assessment of Snort-based Network Intrusion Detection System

Show simple item record

dc.contributor.author Ibrahim, RihamGafer Mohamed
dc.contributor.author Supervisor, -Ahmed Abdalla Mohamed Ali
dc.date.accessioned 2021-08-23T11:46:07Z
dc.date.available 2021-08-23T11:46:07Z
dc.date.issued 2021-04-22
dc.identifier.citation Ibrahim, RihamGafer Mohamed .Performance Assessment of Snort-based Network Intrusion Detection System \ Riham Gafer Mohamed Ibrahim ; Ahmed Abdalla Mohamed Ali .- Khartoum: Sudan University of Science and Technology, College of Engineering, 2021.-53 p: ill;28cm.- M.Sc en_US
dc.identifier.uri http://repository.sustech.edu/handle/123456789/26475
dc.description Thesis en_US
dc.description.abstract Intoday's world securing network resource is an important issuse. One of the mechanisms that is used to secure network against attackers is Intrusion Detection System(IDS). Snort is the famous and wildly used IDS. This research assesses snort by testing it in two different ways. The first way is an off-line test with a benchmark dataset. The test is done with the use of Defense Advanced Research Projects Agency (DARPA) dataset as incoming traffic while running snort in NIDS mode.Snort analyzed this traffic according to rules configured in its configuration file where each attack had specific rules that are used to detect it. This research concerns with Denial of service (DOS) attack, probe attack,Remote to Local (R2L) and User to Root(U2R) attack. The second way is an online test using Kali tool as remote hacking host and another host as target. Result showed that snort in the first way can detect U2R and R2L attacks perfectly and can detect probing and DOS attacks with a number of false positive alerts. In the second way snort can detect scanning and Secure Shell (SSH) attacks very well with no dropped packet and detect Internet Control Message Protocol(ICMP) flooding attack but with dropping some packet. Snort can make alert for all incoming attack but it cannot alert every incoming packet because its cannot handle multiples packet in small time duration. Using of Snort within collection of detecting system can enhance intrusion detection efficiency. en_US
dc.description.sponsorship Sudan University of Science & Technology en_US
dc.language.iso en en_US
dc.publisher Sudan University of Science and Technology en_US
dc.subject Engineering en_US
dc.subject Electronics Engineering en_US
dc.subject Snort-based Network en_US
dc.subject Intrusion Detection System en_US
dc.title Performance Assessment of Snort-based Network Intrusion Detection System en_US
dc.title.alternative تقييم أداء نظام اكتشاف التسلل في الشبكات المعتمد على سنورت en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Share

Search SUST


Browse

My Account