z-logo
open-access-imgOpen Access
Using different processors as predictors to detect a data packet logging into the Snort network with minimal delay time
Author(s) -
Suhad Abbas Yassir,
Nahla Flayyih Hasani,
Haidar Raad Shakir
Publication year - 2020
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/671/1/012055
Subject(s) - computer science , network packet , network security , network processor , packet analyzer , intrusion detection system , computer network , overhead (engineering) , end to end delay , the internet , real time computing , operating system , embedded system , computer security
The growing number of Internet threats has increased demand for better defence and information security in computer systems. Snort is a Network Intrusion Detection System (NIDS) used in network security by staying on the edge of a network and performing deep packet checking on any packet logging in to the protected domain. The question of how much overhead is introduced into the network traffic by the introduction of real-time NIDS was thus investigated. A simulation methodology was used to implement experiments to evaluate the effect of Snort, measured by end-to-end delay-time introduced by the engine. These experiments proved that there is no noticeable effect on network traffic from such an introduction. IBM SPSS software version 24 was used in this study.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here