Analyzing pattern matching algorithms applied on snort intrusion detection system

Currently, intrusion detection system has become widely used as a network perimeter security. The used of IDS to prevent the extremely sophisticated attacks in most of our industries, governmental organization and educational institutions .However ,Intrusion detection system can be either host-based...

Full description

Saved in:
Bibliographic Details
Main Author: Abdullahi, Abdifatah Abdirahman
Format: Thesis
Language:English
Published: 2013
Subjects:
Online Access:http://eprints.utm.my/id/eprint/33765/1/AbdifatahAbdirahmanAbdullahiMFC2013.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utm-ep.33765
record_format uketd_dc
spelling my-utm-ep.337652021-07-26T03:50:07Z Analyzing pattern matching algorithms applied on snort intrusion detection system 2013 Abdullahi, Abdifatah Abdirahman QA75 Electronic computers. Computer science Currently, intrusion detection system has become widely used as a network perimeter security. The used of IDS to prevent the extremely sophisticated attacks in most of our industries, governmental organization and educational institutions .However ,Intrusion detection system can be either host-based or network based intrusion detection system, in a host-base intrusion it monitors the host where its configured while the network-based IDS it monitors both inbound and outbound traffic network. Furthermore, signature based or anomaly based detection techniques are used to detect malicious packets or attack in both network and host-based intrusion detection systems. Therefore, the challenges faced by most of the signature based detection systems like Snort tool is incapability to detect malicious traffic at higher traffic network, which resulted in a packet drooping and subjected the network where this signature based system is configured as a network perimeter security. The challenges resulted as a result of inefficiency of the pattern matching algorithms to efficiently perform pattern matching. Moreover, this project research work aim to compare the current Boyer-Moore pattern matching algorithm applied by the snort IDS with the Quick Search pattern matching algorithm in order to evaluate their performance and recommend for the implementation of the new pattern matching algorithm that will enhance snort detection performance. 2013 Thesis http://eprints.utm.my/id/eprint/33765/ http://eprints.utm.my/id/eprint/33765/1/AbdifatahAbdirahmanAbdullahiMFC2013.pdf application/pdf en public http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:82656?queryType=vitalDismax&query=+Analyzing+pattern+matching+algorithms+applied+on+snort+intrusion+detection+system&public=true masters Unversiti Teknologi Malaysia, Faculty of Computing Faculty of Computing
institution Universiti Teknologi Malaysia
collection UTM Institutional Repository
language English
topic QA75 Electronic computers
Computer science
spellingShingle QA75 Electronic computers
Computer science
Abdullahi, Abdifatah Abdirahman
Analyzing pattern matching algorithms applied on snort intrusion detection system
description Currently, intrusion detection system has become widely used as a network perimeter security. The used of IDS to prevent the extremely sophisticated attacks in most of our industries, governmental organization and educational institutions .However ,Intrusion detection system can be either host-based or network based intrusion detection system, in a host-base intrusion it monitors the host where its configured while the network-based IDS it monitors both inbound and outbound traffic network. Furthermore, signature based or anomaly based detection techniques are used to detect malicious packets or attack in both network and host-based intrusion detection systems. Therefore, the challenges faced by most of the signature based detection systems like Snort tool is incapability to detect malicious traffic at higher traffic network, which resulted in a packet drooping and subjected the network where this signature based system is configured as a network perimeter security. The challenges resulted as a result of inefficiency of the pattern matching algorithms to efficiently perform pattern matching. Moreover, this project research work aim to compare the current Boyer-Moore pattern matching algorithm applied by the snort IDS with the Quick Search pattern matching algorithm in order to evaluate their performance and recommend for the implementation of the new pattern matching algorithm that will enhance snort detection performance.
format Thesis
qualification_level Master's degree
author Abdullahi, Abdifatah Abdirahman
author_facet Abdullahi, Abdifatah Abdirahman
author_sort Abdullahi, Abdifatah Abdirahman
title Analyzing pattern matching algorithms applied on snort intrusion detection system
title_short Analyzing pattern matching algorithms applied on snort intrusion detection system
title_full Analyzing pattern matching algorithms applied on snort intrusion detection system
title_fullStr Analyzing pattern matching algorithms applied on snort intrusion detection system
title_full_unstemmed Analyzing pattern matching algorithms applied on snort intrusion detection system
title_sort analyzing pattern matching algorithms applied on snort intrusion detection system
granting_institution Unversiti Teknologi Malaysia, Faculty of Computing
granting_department Faculty of Computing
publishDate 2013
url http://eprints.utm.my/id/eprint/33765/1/AbdifatahAbdirahmanAbdullahiMFC2013.pdf
_version_ 1747816179640041472