New Use Cases for Snort: Cloud and Mobile Environments

02/07/2018
by   Emre Erturk, et al.
0

First, this case study explores an Intrusion Detection System package called Snort (provided by Cisco Systems) in a cloud environment. Snort is an open source and highly scalable signature-based intrusion detection system. Here, Snort is deployed on Ubuntu Server 16.0.4 running on a virtual machine within a Microsoft Azure cloud system. This paper provides details on installing Snort on the virtual machine and configuring it for intrusion detection. The architecture here is based on a VM integrated IDS on Azure and demonstrates how a VM instance in the cloud can be secured through an IDS. Firewalls may be considered the first line of defense but they fail to secure systems from inside attacks. Next, two other areas (where Snort is less widely used) are briefly explored, namely library systems and mobile devices. Finally, this paper makes further recommendations on how a cloud network can be secured by distributed placement of the IDS and on each VM instances.

READ FULL TEXT

page 5

page 7

page 9

page 10

research
09/15/2020

Data-Driven Network Intrusion Detection: A Taxonomy of Challenges and Methods

Data-driven methods have been widely used in network intrusion detection...
research
02/01/2018

Snort Intrusion Detection System with Intel Software Guard Extension (Intel SGX)

Network Function Virtualization (NFV) promises the benefits of reduced i...
research
05/01/2019

On generating network traffic datasets with synthetic attacks for intrusion detection

Most research in the area of intrusion detection requires datasets to de...
research
12/15/2020

Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach

This paper reviews existing Intrusion Detection Systems (IDS) that targe...
research
07/22/2020

Evaluation of Network Based IDS and Deployment of multi-sensor IDS

Cloud-based and network-based technology has witnessed an exponential ri...
research
09/17/2019

Walling up Backdoors in Intrusion Detection Systems

Interest in poisoning attacks and backdoors recently resurfaced for Deep...
research
01/24/2021

Online Memory Leak Detection in the Cloud-based Infrastructures

A memory leak in an application deployed on the cloud can affect the ava...

Please sign up or login with your details

Forgot password? Click here to reset