Network Intrusion Detection System Using SNORT

  • Soh, Woo-Young (Computer Engineering Dept. Graduate School, Hannam University) ;
  • Sigfred, Jason (Computer Engineering Dept. Graduate School, Hannam University)
  • Published : 2006.08.31

Abstract

Keywords

References

  1. SNORT's Documentation, URL: http://www.SNORT.org
  2. K. Kendall, 'A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems', M.Eng. Paper, MIT Department of Electrical Engineering and Computer Science, June 1999
  3. K. J. Das, 'Attack Development for Intrusion Detection Evaluation', M.Eng. Paper, MIT Department of Electrical Engineering and Computer Science, June 2000
  4. Richard Lippman, et. al., 'The 1999 DARPA Off-line Intrusion Detection Evaluation', submitted to Proceedings of 3rd International Workshop on Recent Advances in Intrusion Detection (RAID 2000)
  5. N. Puketza, et. al., 'A Methodology for Testing Intrusion Detection System', Proc. 17th National Computer Security Conference, October 1994