Distributed architecture of snort IDS in cloud environment

2Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Intrusion Detection System (IDS) is the most used mechanism for intrusion detection. Traditional IDS have been used to detect suspicious behaviors in network communication and hosts. However, with the evolution of Intrusion detection datasets size, we faced a new challenge which is storing those large datasets in Cloud Infrastructure and analyzing datasets traffic using Big data technology. Furthermore, some Cloud providers allow deploying and configuring IDS for the user. In this paper, we will introduce an architecture based on Snort IDS in cloud computing with distributed intrusion detection datasets.

Cite

CITATION STYLE

APA

Essid, M., Jemili, F., & Korbaa, O. (2021). Distributed architecture of snort IDS in cloud environment. In Advances in Intelligent Systems and Computing (Vol. 1181 AISC, pp. 100–111). Springer. https://doi.org/10.1007/978-3-030-49342-4_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free