Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,666,135 papers from all fields of science
Search
Sign In
Create Free Account
Snort
Snort is a free and open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS) created by Martin Roesch in…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
47 relations
ACARM-ng
ARP spoofing
Aanval
Alert correlation
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Big Data Testbed for Network Attack Detection
Dániel Csubák
,
K. Szücs
,
Péter Vörös
,
A. Kiss
2016
Corpus ID: 19713923
Establishing an effective defense strategy in IT security is essential on one hand, but very challenging on the other hand…
Expand
Review
2015
Review
2015
Some Studies in Intrusion Detection using Data Mining Techniques
Inadyuti Dutt
,
Dr. Samarjeet Borah
2015
Corpus ID: 212534799
: This paper surveys the present data mining techniques used in detecting intrusions in a computer networks. The basic objective…
Expand
2014
2014
Automatic Detection and Rectification of DNS Reflection Amplification Attacks with Hadoop MapReduce and Chukwa
A. Jose
,
B. A
Fourth International Conference on Advances in…
2014
Corpus ID: 18987014
DNS Reflection Amplification Attacks are now a days popular and it is the Distributed Denial of Service Attack. This attack makes…
Expand
2013
2013
Security Threats to Cloud Computing
Prashant Kumar
,
L. Kumar
,
Kapil Kumar
2013
Corpus ID: 17652133
Cloud computing offer a new and exciting way of computing with various service models that facilitates different services to the…
Expand
2009
2009
A Digest and Pattern Matching-Based Intrusion Detection Engine
Zhongqiang Chen
,
Yuan Zhang
,
Zhongrong Chen
,
A. Delis
Computer/law journal
2009
Corpus ID: 13912841
Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to…
Expand
2009
2009
Artificial Neural Network for Mobile IDS Solution
F. A. Barika
,
K. Hadjar
,
N. E. Kadhi
2009
Corpus ID: 15773882
The aim of this paper is to suggest an Artificial Neural Network architecture for decision making within intrusion detection…
Expand
2009
2009
Snort Performance Evaluation
F. Alserhani
,
M. Akhlaq
,
I. Awan
,
A. Cullen
,
J. Mellor
,
Pravin Mirchandani
2009
Corpus ID: 16934021
Intrusion Detection Systems (IDS) are among the fastest growing technologies in computer security domain. These systems are…
Expand
2005
2005
Real Time Detection of Novel Attacks by Means of Data Mining Techniques
M. Esposito
,
Claudio Mazzariello
,
Francesco Oliviero
,
S. Romano
,
Carlo Sansone
International Conference on Enterprise…
2005
Corpus ID: 4694582
Rule-based Intrusion Detection Systems (IDS) rely on a set of rules to discover attacks in network traffic. Such rules are…
Expand
Highly Cited
2003
Highly Cited
2003
Intrusion Detection with SNORT (Bruce Perens' Open Source Series): Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID
R. Rehman
,
Noreen Regina
2003
Corpus ID: 58071979
From the Publisher: Protect your network with Snort: the high-performance, open source IDS Snort gives network administrators…
Expand
2001
2001
USE OF PASSIVE NETWORK MAPPING TO ENHANCE SIGNATURE QUALITY OF MISUSE NETWORK INTRUSION DETECTION SYSTEMS
Burak Dayioglu
,
A. Özgit
2001
Corpus ID: 17694772
There is disclosed an axial flow fan having blades which may be rotated about their axes to permit their pitches to be adjusted…
Expand