Performance Evaluation in High-Speed Networks by the Example of Intrusion Detection

05/29/2018
by   Thomas Lukaseder, et al.
0

Purchase decisions for devices in high-throughput networks as well as scientific evaluations of algorithms and technologies need to be based in measurements and clear procedures. Therefore, evaluation of network devices and their performance in high-throughput networks is an important part of research. In this paper, we document our approach and show its applicability for our purpose in an evaluation of two of the most well-known and common open source intrusion detection systems, Snort and Suricata. We used a hardware network testing setup to ensure a realistic environment and documented our testing approach. In our work, we focus on accuracy of the detection especially dependent on bandwidth. We would like to pass on our experiences and considerations.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/15/2020

Feature Selection and Intrusion Detection in Cloud Environment based on Machine Learning Algorithms

Characteristics and way of behavior of attacks and infiltrators on compu...
research
01/27/2020

Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process

The identification of cyberattacks which target information and communic...
research
05/05/2019

Performance evaluation of a NDN forwarder using statistical model checking

Named Data Networking (NDN) is an emerging technology for a future inter...
research
06/22/2023

Decentralized Online Federated G-Network Learning for Lightweight Intrusion Detection

Cyberattacks are increasingly threatening networked systems, often with ...
research
10/24/2017

Approximate Reduction of Finite Automata for High-Speed Network Intrusion Detection

We consider the problem of approximate reduction of non-deterministic au...
research
10/24/2017

Approximate Reduction of Finite Automata for High-Speed Network Intrusion Detection (Technical Report)

We consider the problem of approximate reduction of non-deterministic au...
research
07/22/2020

Evaluation of Network Based IDS and Deployment of multi-sensor IDS

Cloud-based and network-based technology has witnessed an exponential ri...

Please sign up or login with your details

Forgot password? Click here to reset