Dynamic Rule Based Traffic Analysis in NIDS

Download Now
Provided by: Research In Motion
Topic: Security
Format: PDF
A set of rules are used to detect or prevent the hostile data traffic in a network. In dynamic computing environment, security challenges are increasing day-by-day. It is so important to detect the abnormal behavior in a packet. There are lots of techniques and tools are used to determine the suspicious behavior. In this paper, the authors have used snort as an IDS engine to detect the signature of packet using rules. Any type of Virus, worm or say infected packet have some sort of signature.
Download Now

Find By Topic