TY - JOUR KW - Cybersecurity KW - heuristic algorithm KW - intrusion detection KW - network attack AU - Bartłomiej Gdowski AU - Rafał Kościej AU - Marcin Niemiec AB -
This article provides an introduction to intrusion detection systems, focusing on extending the Snort environment’s functionalities by adding a new heuristic detection algorithm. The algorithm allows to detect selected types of cyberattacks through analysis of received packets and based on a list of malicious Internet Protocol addresses. Furthermore, the algorithm underwent functional verification. The results confirmed that the algorithm successfully detects the packets originating from the provided list and rates them accordingly.
BT - Information & Security: An International Journal DO - https://doi.org/10.11610/isij.5010 IS - 1 N2 -This article provides an introduction to intrusion detection systems, focusing on extending the Snort environment’s functionalities by adding a new heuristic detection algorithm. The algorithm allows to detect selected types of cyberattacks through analysis of received packets and based on a list of malicious Internet Protocol addresses. Furthermore, the algorithm underwent functional verification. The results confirmed that the algorithm successfully detects the packets originating from the provided list and rates them accordingly.
PY - 2021 SP - 23 EP - 36 T2 - Information & Security: An International Journal TI - Heuristic-based Intrusion Detection Functionality in a Snort Environment VL - 50 ER -