Have a personal or library account? Click to login
Experimental load test statistics for the selected IPS tools on low-performance IoT devices Cover

Experimental load test statistics for the selected IPS tools on low-performance IoT devices

Open Access
|Oct 2019

References

  1. [1] M. Yassein, Q. Abuein, and S. Alasal, “Combining software-defined networking with Internet of Things: Survey on security performance aspects”, Proceedings of the International Conference on Engineering & MIS (ICEMIS) Monastir, Tunisia, 8-10 May 2017.10.1109/ICEMIS.2017.8273027
  2. [2] A. Lupia and F. De Rango, “Performance evaluation of secure AODV with trust management under an energy aware perspective”, Proceedings of the International Symposium on Performance Evaluation of Computer Telecommunication Systems Monterey, CA, USA, 6-10, 2014.10.1109/SPECTS.2014.6879999
  3. [3] C. Y. Tseung, K. P. Chow, and X. Zhang, “Anti-DDoS technique using self-learning bloom filter”, Proceedings of the 2017 IEEE International Conference on Intelligence Security Informatics (ISI), Beijing China, 2017.10.1109/ISI.2017.8004917
  4. [4] B. Mukherjee, R. L. Neupane, and P. Calyam, “End-to-End IoT Security Middleware for Cloud-Fog Communication”, Proceedings of the 2017 IEEE 4th International Conference on Cyber Security Cloud Computing (CSCloud), New York USA, 2017.10.1109/CSCloud.2017.62
  5. [5] G. Kalnoor and J. Agarkhed, “Pattern Matching Intrusion Detection Technique for Wireless Sensor Networks”, Proceedings of the International Conference on Advances in Electrical Electronics, Information, Communication Bio-Informatics (AEEICB16), Chennai, India, 2016.10.1109/AEEICB.2016.7538389
  6. [6] G. Kalnoor and J. Agarkhed, Snort - Network Intrusion Detection & Prevention System, Available online: https://www.snort.org (accessed on 1st August 2018).
  7. [7] P. Singh, S. Behal, and K. Kumar, “Performance Enhancement of a Malware Detection System using Score Based Prioritization of Snort Rules”, Proceedings of the 2015 International Conference on Green Computing Internet of Things (ICGCIoT), Noida India, 2016.10.1109/ICGCIoT.2015.7380636
  8. [8] A. Sagala, “Automatic Snort IDS Rule Generation Based on Honeypot Log”, Proceedings of the 2015 7th International Conference on Information Technology Electrical Engineering (ICITEE), Chiang Mai Thailand, 2015.10.1109/ICITEED.2015.7409013
  9. [9] A. Garg and P. Maheshwari, “Performance Analysis of Snort-based Intrusion Detection System”, Proceedings of the 2016 3rd International Conference on Advanced Computing Communication Systems (ICACCS), Coimbatore India, 2016.10.1109/ICACCS.2016.7586351
  10. [10] N. Naik, R. Diao, and Q. Shen, “Application of Dynamic Fuzzy Rule Interpolation for Intrusion Detection: D-FRI-Snort”, Proceedings of the 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Vancouver BC, Canada, 2016.10.1109/FUZZ-IEEE.2016.7737671
  11. [11] E. Albin and N. Rowe, “A Realistic Experimental Comparison of the Suricata Snort Intrusion-Detection Systems”, Proceedings of the 2012 26th International Conference on Advanced Information Networking Applications Workshops, Fukuoka Japan, 2012.10.1109/WAINA.2012.29
  12. [12] J. White, T. Fitzsimmons, and J. Matthews, “Quantitative analysis of intrusion detection systems: Snort Suricata”, SPIE Defense Security Sensing Cyber Security Conference, vol. 8757 Baltimore, USA, 2013.10.1117/12.2015616
  13. [13] M. Ennert, E. Chovancova, and Z. Dudlakova, “Testing of IDS model using several intrusion detection tools”, Journal of Applied Mathematics Computational Mechanics, vol. 14 no. 1, pp. 55-62, 2013.10.17512/jamcm.2015.1.05
  14. [14] K. Thongkanchorn, S. Ngamsuriyaroj, and V. Visoottiviseth, “Evaluation Studies of Three Intrusion Detection Systems under Various Attacks Rule Sets”, Proceedings of the 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013), Xi’an China, 22-25, 2013.10.1109/TENCON.2013.6718975
  15. [15] S. Sremath, H. Sathu, and A. Sarrafzadeh, “Free open source intrusion detection systems: a study”, Proceedings of the 2015 International Conference on Machine Learning Cybernetics (ICMLC), Guangzhou China, 2015.
  16. [16] D. Bhosale and V. Mane, “Comparative Study Analysis of Network Intrusion Detection Tools”, Proceedings of the 2015 International Conference on Applied Theoretical Computing Communication Technology (iCATccT), Davangere India, 2015.10.1109/ICATCCT.2015.7456901
  17. [17] B. Brumen and J. Legvart, “Performance analysis of two open source intrusion detection systems”, Proceedings of the 2016 39th International Convention on Information Communication Technology Electronics Microelectronics (MIPRO), Opatija, Croatia, 2016.10.1109/MIPRO.2016.7522356
  18. [18] L. Tuong and K. Kimura, “2-Step Power Scheduling with Adaptive Control Interval for Network Intrusion Detection Systems on Multicores”, Proceedings of the 2016 IEEE 10th International Symposium on Embedded Multicore/Many-core Systems-on-Chip (MCSOC), Lyon France, 21-23, 2016.10.1109/MCSoC.2016.18
  19. [19] P. S. Horn, “Some Easy t Statistics.”, J, of the Americ. Statist. Assoc. 78, 930-936, 1983.10.1080/01621459.1983.10477042
  20. [20] https://github.com/esnet/iperf.
DOI: https://doi.org/10.2478/jee-2019-0058 | Journal eISSN: 1339-309X | Journal ISSN: 1335-3632
Language: English
Page range: 285 - 294
Submitted on: Jul 13, 2019
|
Published on: Oct 21, 2019
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2019 Tomas Zitta, Michal Lucki, Lukas Vojtech, Marek Neruda, Lenka Mejzrova, published by Slovak University of Technology in Bratislava
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.