Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/8261
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGündoğdu, I.-
dc.contributor.authorSelçuk, Ali Aydın-
dc.contributor.authorÖzarslan, S.-
dc.date.accessioned2022-01-15T13:00:46Z-
dc.date.available2022-01-15T13:00:46Z-
dc.date.issued2021-
dc.identifier.isbn9781665436496-
dc.identifier.urihttps://doi.org/10.1109/SIU53274.2021.9477698-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/8261-
dc.description29th IEEE Conference on Signal Processing and Communications Applications, SIU 2021 -- 9 June 2021 through 11 June 2021 -- 170536en_US
dc.description.abstractSnort is one of the most used open source intrusion detection systems today. It is also supported by a large number of open source rulesets. The purpose of this study is to test the effectiveness of the public rule sets developed for the Snort intrusion detection system against different types of attack traffic. For this purpose, by configuring the Snort attack detection system with different rule sets, experiments have been conducted to measure whether each rule set prevents different attack types such as CVE-referenced vulnerability exploitation attacks, web application attacks and malware traffics. During the experiments, the rule sets were tested separately as well as tests in which all the rule sets were used together. As a result of the experiments, it was observed that the most effective rule set when used alone was the Talos rule set, and the highest efficiency was achieved when all the rule sets were used together. © 2021 IEEE.en_US
dc.language.isotren_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.relation.ispartofSIU 2021 - 29th IEEE Conference on Signal Processing and Communications Applications, Proceedingsen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectIntrusion Detection Systemen_US
dc.subjectPublic Rule Setsen_US
dc.subjectSnorten_US
dc.subjectMalwareen_US
dc.subjectOpen systemsen_US
dc.subjectSignal processingen_US
dc.subjectAttack detectionen_US
dc.subjectAttack trafficen_US
dc.subjectDifferent attacksen_US
dc.subjectEffectiveness analysisen_US
dc.subjectIntrusion Detection Systemsen_US
dc.subjectOpen sourcesen_US
dc.subjectRule seten_US
dc.subjectWeb application attacksen_US
dc.subjectIntrusion detectionen_US
dc.titleEffectiveness Analysis of Public Rule Sets Used in Snort Intrusion Detection Systemen_US
dc.title.alternativeSnort Saldiri Tespit Sisteminde Kullanilan Açik Kural Setlerinin Etkinlik Analizien_US
dc.typeConference Objecten_US
dc.departmentFaculties, Faculty of Engineering, Department of Computer Engineeringen_US
dc.departmentFakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümütr_TR
dc.identifier.wosWOS:000808100700002en_US
dc.identifier.scopus2-s2.0-85111451485en_US
dc.institutionauthorSelçuk, Ali Aydın-
dc.identifier.doi10.1109/SIU53274.2021.9477698-
dc.authorscopusid57226403070-
dc.authorscopusid7004457288-
dc.authorscopusid55806963700-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
item.openairetypeConference Object-
item.languageiso639-1tr-
item.grantfulltextnone-
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
crisitem.author.dept02.3. Department of Computer Engineering-
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

Page view(s)

146
checked on Dec 23, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.