Sorry, we do not have enough data to show an influence graph for this author.
- Full text PDF available (0)
This project was designed to discover the relationship between the number of enabled rules maintained by Snort and the amount of computing resources necessary to operate this intrusion detection system (IDS) as a sensor. A physical environment was set up to loosely simulate a network and an IDS sensor monitoring it. The experiment was conducted in five… (More)