Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,370,301 papers from all fields of science
Search
Sign In
Create Free Account
Snort
Snort is a free and open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS) created by Martin Roesch in…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
47 relations
ACARM-ng
ARP spoofing
Aanval
Alert correlation
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Big Data Testbed for Network Attack Detection
Dániel Csubák
,
K. Szücs
,
Péter Vörös
,
A. Kiss
2016
Corpus ID: 19713923
Establishing an effective defense strategy in IT security is essential on one hand, but very challenging on the other hand…
Expand
2015
2015
An OpenFlow-based collaborative intrusion prevention system for cloud networking
N. Huang
,
C. Wang
,
I-Ju Liao
,
Chengtah Lin
,
Chia-Nan Kao
IEEE International Conference on Communication…
2015
Corpus ID: 18803219
Software-Defined Networking (SDN) is an emerging architecture that is ideal for today's high-bandwidth, dynamic network…
Expand
2009
2009
A Digest and Pattern Matching-Based Intrusion Detection Engine
Zhongqiang Chen
,
Yuan Zhang
,
Zhongrong Chen
,
A. Delis
Computer/law journal
2009
Corpus ID: 13912841
Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to…
Expand
2008
2008
Pipelined Architecture for Multi-String Matching
D. Pao
,
Wei Lin
,
B. Liu
IEEE computer architecture letters
2008
Corpus ID: 18020599
This letter presents a new oblivious routing algorithm for 3D mesh networks called randomized partially-minimal (RPM) routing…
Expand
2007
2007
SpyCon: Emulating User Activities to Detect Evasive Spyware
M. Chandrasekaran
,
V. Sankaranarayanan
,
S. Upadhyaya
IEEE International Performance, Computing, and…
2007
Corpus ID: 510784
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies…
Expand
2004
2004
Intrusion detection system for high-speed network
Wu Yang
,
Binxing Fang
,
Bo Liu
,
Hongli Zhang
Computer Communications
2004
Corpus ID: 5256099
2004
2004
Formal Reasoning About Intrusion Detection Systems
Tao Song
,
C. Ko
,
J. Alves-Foss
,
Cui Zhang
,
K. Levitt
International Symposium on Recent Advances in…
2004
Corpus ID: 17322967
Intrusion detection is an appealing approach to improving the security of systems. The goal of intrusion detection is to detect…
Expand
Highly Cited
2003
Highly Cited
2003
Intrusion Detection with SNORT (Bruce Perens' Open Source Series): Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID
R. Rehman
,
Noreen Regina
2003
Corpus ID: 58071979
From the Publisher: Protect your network with Snort: the high-performance, open source IDS Snort gives network administrators…
Expand
2001
2001
Heterogeneous Sensor Correlation: A Case Study of Live Traffic Analysis
D. Andersson
,
Martin W. Fong
,
A. Valdes
2001
Corpus ID: 14159625
As enterprises deploy multiple intrusion detection sensors at key points in their networks, the issue of correlating messages…
Expand
Review
2001
Review
2001
Translating Snort rules to STATL scenarios
S. T. Eckmann
2001
Corpus ID: 57457445
The number of intrusion detection systems (IDSs) is large and growing. Most IDSs are signature based, which means that they…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE