IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 5 - Issue 7, July 2016 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Intrusion Detection & Prevention Systems - Sourcefire Snort

[Full Text]

 

AUTHOR(S)

Rajesh Vuppala, Mohammed Farik

 

KEYWORDS

Information Security, Cyber threats, Cyber-attacks, Viruses, IDPS

 

ABSTRACT

Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection & prevention systems available to choose from, selecting the best solution to implement to detect & prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews, and suits the organization’s needs & budget. In this review paper, we summarize various classes of intrusion detection and prevention systems, compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

 

REFERENCES

[1] J.P. Anderson. Computer Security Threat Monitoring and Surveillance. Technical report, James P Anderson Co.,Fort Washington, Pennsylvania, April 1980.

[2] J MJ. McHugh, A. Christie, J. Allen, “Defending Yourself: The Role of Intrusion Detection Systems,” In IEEE Software September/October 2000 Focus Malicious IT, pages 42 – 51.

[3] SANS Institute Info Sec Reading Room” Understanding Intrusion detection systems” E. Amoroso and R. Kwapniewski, “A Selection Criteria for Intrusion Detection Systems,” Proc. 14th Ann. Computer Security Applications Conf., IEEE Computer Soc. Press, Los Alamitos, Calif., 1998, pp. 280–288.

[4] Andreas Fuchsberger,”Intrusion Detection Systems and Intrusion Prevention Systems “Information Security Technical Report Elsevier (2005) 10, 134-139.

[5] OSSEC (Observing System Science Executive Council) OSS. Homepage of ossec, 2011. http://www.ossec.net/. Online; accessed: 28.4.2012

[6] Classification for IDPS at ARPN Journal of Science and Technology::Intrusion Detection and Prevention System: classification and Quick Review - vol2no7_17.pdf

[7] Comparative analysis at : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.402.4979&rep=rep1&type=pdf

[8] Best IDS system : http://searchsecurity.techtarget.com/guide/Best-Intrusion-Detection-and-Prevention-Products-2011

[9] Best IPS system: http://searchsecurity.techtarget.com/feature/Best-of-intrusion-detection-and-prevention-2013

[10] Basic information about IDPS at : https://en.wikipedia.org/wiki/Intrusion_detection_system

[11] Top free network based IDPS systems at: https://www.upguard.com/articles/top-free-network-based-intrusion-detection-systems-ids-for-the-enterprise