Snort ids system visualization interface for alert analysis
-
Published:2022
Issue:1
Volume:19
Page:67-78
-
ISSN:1451-4869
-
Container-title:Serbian Journal of Electrical Engineering
-
language:en
-
Short-container-title:Serb J Electr Eng
Author:
Gavrilovic Nadja1, Ciric Vladimir1, Lozo Nikola1
Affiliation:
1. Faculty of Electronic Engineering, University of Niš, Niš, Serbia
Abstract
Over the past decades, the rapid Internet development and the growth in the
number of its users have raised various security issues. Therefore, it is of
great importance to ensure the security of the network in order to enable
the safe exchange of confidential data, as well as their integrity. One of
the most important components of network attack detection is an Intrusion
Detection System (IDS). Snort IDS is a widely used intrusion detection
system, which logs alerts after detecting potentially dangerous network
packets. A major challenge in network monitoring is the high volume of
generated IDS alerts. A necessary step in successful network protection is
the analysis of the great amount of logged alerts in search of deviations
from normal traffic that may indicate an intrusion. The goal of this paper
is to design and implement a visualization interface for IDS alert analysis,
which graphically presents alerts generated by Snort IDS. Also, the proposed
system classifies the alerts according to the most important attack
parameters, and allows the users to understand evolving network situations
and easily detect possible traffic irregularities. An environment in which
the system has been tested in real-time is described, and the results of
attack detection and classification are given. One of the detected attacks
is analyzed in detail, as well as the method of its detection and its
possible consequences.
Funder
Ministry of Education, Science and Technological Development of the Republic of Serbia
Publisher
National Library of Serbia
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Mechanical Engineering,Energy Engineering and Power Technology,Control and Systems Engineering
Reference20 articles.
1. H.- J. Liao, C.- H. R. Lin, Y.- C. Lin, K.- Y. Tung: Intrusion Detection System: A Comprehensive Review, Journal of Network and Computer Applications, Vol. 36, No. 1, January 2013, pp. 16-24. 2. A. Khraisat, I. Gondal, P. Vamplew, J. Kamruzzaman: Survey of Intrusion Detection Systems: Techniques, Datasets and Challenges, Cybersecurity, Vol. 2, July 2019, pp. 20-1-20-22. 3. J. M. Kizza: Guide to Computer Network Security, 4th Edition, Springer, Chattanooga, 2017. 4. W. Stallings, L. Brown: Computer Security: Principles and Practice, 4th Edition, Pearson Education, Inc., Hoboken, 2018. 5. G. Ahmed, M. N. A. Khan, M. S. Bashir: A Linux-Based IDPS Using Snort, Computer Fraud and Security, Vol. 2015, No. 8, August 2015, pp. 13-18.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Autoencoder-Based Network Intrusion Detection on Multiple Datasets;2024 IEEE 22nd Mediterranean Electrotechnical Conference (MELECON);2024-06-25 2. Clustering and Visualization of Network Security-Related Data using Elastic Stack;2023 10th International Conference on Electrical, Electronic and Computing Engineering (IcETRAN);2023-06-05
|
|