P Liang, JM Shuai, XB Tan… - Jisuanji Gongcheng/ …, 2011 - en.cnki.com.cn As to decrease the CPU time during detection in Snort2,this paper proposes a method based on decision tree to classify rule set aiming at avoiding needless rules construction resulted from port classification,and a better way to construct rule by information values of matching ... Related articles - Cached - All 2 versions
D Day… - ICDS 2011, The Fifth International Conference on …, 2011 - thinkmind.org Abstract: Recently, there has been shift to multi-core processors and consequently multithreaded application design. Multithreaded Network Intrusion Detection and Prevention Systems (NIDPS) are now being considered. Suricata is a multithreaded open source NIDPS, ... Cached
X Zhao - Jisuanji Xitong Yingyong- Computer Systems and …, 2011 - csa.com To address the problem of high rate of dropping packets in high network flow of Snort network intrusion detection system, a way of multimedia data identification in network flow and two approaches to processing multimedia data has been designed by analyzing the characteristic of ...
L ZHENG, G WU, X HU, Q LIU… - Journal of Hefei University …, 2011 - en.cnki.com.cn Pattern matching algorithm is the core of the rule-based intrusion detection system(IDS).The pattern-matching principle of the Snort and the improved 2C-BM algorithm based on BM algorithm are described in this paper.The method of array positioning and labeling is applied to ... Related articles - Cached
AN Singh, S Kumar… - Advances in Network Security and …, 2011 - Springer ... Furthermore, in order to improve the detection performance of our IDS, the Apriori algorithm for association rule mining is used on the data logged by honeypot to generate rules which will be added to the Snort IDS dynamically. ... Related articles - All 2 versions